期刊文献+

一种数据库入侵检测模型的研究 被引量:1

Research of a Model of Database Intrusion Detection
下载PDF
导出
摘要 提出了一种数据库入侵检测模型,利用该模型对数据库审计信息进行挖掘,以发现代表合法用户典型行为的用户轮廓。利用用户轮廓可以发现用户的误用行为。 This paper presents a model of database intrusion detection system, which uses data mining on the audit data in database systems to derive user profiles that describe normal behavior of users. The profiles can be used to detect abnormal behavior of users.
出处 《计算机应用研究》 CSCD 北大核心 2006年第4期97-98,100,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2002AA141091)
关键词 数据库入侵检测 频繁片段 事件描述 Database Intrusion Detection Frequent Episodes Event Description
  • 相关文献

参考文献7

  • 1Wenke Lee,Salvatore J Stolfo.Data Mining Approaches for Intrusion Detection[C].San Antonio:Proceedings of the 7th USENIX Securtiy Symposium,1998.
  • 2Stolfo S,Fan D,Lee W.Credit Card Fraud Detection Using Meta-learning:Issues and Initial Results[C].Proc.AAAI Workshop on AI Approaches to Fraud Detection and Risk Management,1997.
  • 3Christina Yip Chung,Michael Gertz,Karl Levitt.A Misuse Detection System for Database System[C].The 3rd Annual IFIP TC-11 WG 11.5 Working Conf.on Integrity and Internal Control in Information Systems,1999.
  • 4Christina Yip Chung,Michael Gertz,Karl Levitt.Discovery of Multi-Level Security Policies[C].The 14th Annual IFIP WG 11.3 Working Conf.on Database Security,2000.
  • 5H Mannila,H Toivonen,A I Verkamo.Discovering Frequent Episodes in Sequences[C].Montreal:Proceedings of the 1st International Conference on Knowledge Discovery in Database and Data Mining,1995.
  • 6Marek Wojciechowski.Discovering Frequent Episodes in Sequences of Complex Events[C].Prague:Enlarged the 4th East-European Conference on Advances in Databases and Information Systems(ADBIS-DASFAA 2000),2000.
  • 7David Heikki Mannila,Padhraic Smyth.Principles of Data Mining[M].北京:机械工业出版社,2003.272-283.

同被引文献7

  • 1钟勇,秦小麟.数据库入侵检测研究综述[J].计算机科学,2004,31(10):15-18. 被引量:18
  • 2Gosta Grahne ,Jianfei Zhu, Efficiently Using Perfix-trees in Mining Frequent Itemsets. In FIMT03 Workshop on Frequent Itemset Mining Implementations, Melbourne, Florida, USA, Novermber ,2003.
  • 3Liu P. Architectures for Intrusion Tolerant Database Systems. In:Proc. of 18th Annual Computer Security Applications Conf. Las Veags. Nevada. Dec ,2002.
  • 4Castano D,Fugini M G,Martella G,Samarati P. Database Secutity. Addison-Wesley, 1995.
  • 5Axelsson S. Intrusion Detection Systems :A Survey and Taxonomy. Chalmers University of Technology, Dept. of Computer Engineering, Go teborg. Sweden ,2000.
  • 6Chung C Y, Gertz M, Levitt K. DEMIDS:A Misues Detection System for Database System. In: The Thirteen Annual IFIP TC - 11 WG 11.5 Working Conf. On Integrity and Internal Control in Information Systems, 1999.
  • 7Chung C Y,Gertz M, Levitt K. Discovery of Multi-Level Security Policies. In :The Fourteenth Annual IFIP WG 11.3 Working Conf. On Database Security ,2000.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部