期刊文献+

事务级数据库入侵检测系统的设计 被引量:2

Design of an intrusion detection system with transaction-level database
下载PDF
导出
摘要 针对传统入侵检测系统对数据库入侵检测时只能检测出非法用户,而不能检测出该用户进行的具体恶意事务操作的问题,设计了事务级数据库入侵检测系统。在现有入侵检测技术和角色访问控制理论的基础上,训练阶段采用数据挖掘技术对数据库访问角色的日志进行数据事务间的关联规则挖掘,形成知识规则库;在数据库系统正常运行阶段,利用入侵检测算法检测数据库用户异常行为和进行的恶意事务操作。实验测试结果表明,与传统数据库入侵检测系统相比,本设计根据数据依赖关系进行检测,检测粒度更细,维护相对容易;系统适用于对数据库入侵检测要求比较细化的环境。 The purpose of the paper is to design a new type of intrusion detection system with a transaction-level database, which can be used to detect illegal users and their malicious transactional operations on the basis of the intrusion detection theory, the role-based access control mechanism and the data mining technology. In the training period, the rule database is formed by the sequential pattern discovery method to mine the role log files. When the database works, the system can find malicious transactions by using the algorithm of database intrusion detection. Based on the test, we draw the conclusion that the detection granularity is finer and its maintenance is easier.
出处 《中国农业大学学报》 CAS CSCD 北大核心 2006年第4期109-113,共5页 Journal of China Agricultural University
基金 国家自然科学基金资助项目(60573048) 北京市科技计划基金资助项目(H020120090530)
关键词 数据库安全 入侵检测 数据挖掘 数据依赖 database security intrusion detection data mining data dependency
  • 相关文献

参考文献14

  • 1Bertino E,Sandhu R.Database security-concepts,approaches,and challenges[J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19
  • 2Low W L,Joseph L.DIDAFIT:Detecting intrusions in databases through fingerprinting transactions[C].Spain:International Conference on Enterprise Information Systems,2002:264-269
  • 3Luenam P,Liu P.The design of an adaptive intrusion tolerant database system.Proc[J].IEEE Workshop on Intrusion Tolerant Systems (ITS '02),2002,7:14-21
  • 4Ammann P,Jajodia S.Recovery from malicious transactions[J].IEEE Transactions on Knowledge and Data Engineering,2002,15(5):1167-1185
  • 5Lee W,Stolfo S J.Data mining approaches for intrusion detection[C].San Antonio:Proceedings of the 7th USENIX Securtiy Symposium,1998:533-567
  • 6Chung C Y,Gertz M.DEMIDS:A misuse detection system for database systems[C].Amsterdam:In Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems,1999,11:159-178
  • 7王丽娜,董晓梅,郭晓淳,于戈.基于数据挖掘的网络数据库入侵检测系统[J].东北大学学报(自然科学版),2003,24(3):225-228. 被引量:30
  • 8Lee W,Stolfo S J.A data mining framework for building intrusion detection models[J].IEEE Security and Privacy,1999,5:120-132
  • 9David F,Ferraiolo,Sandhu R,et al.A proposed standard for role-based access controls[J].ACM Transactions on Information and Systems Security,2001,4(3):224-274
  • 10Srikant R,Agrawal R.Mining sequential patterns:generalizations and performance improvements[C].Avignon:Proc of the 5th International Conf on Extending Database Technology,1996:3-17

二级参考文献16

  • 1HANJ KAMBERM 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 2Feiertag R, Rho S, Benzinger L,et al. Intrusion detection inter-component adaptive negotiation[J]. Computer Networks, 2000,34(4):605-621.
  • 3Lee W, Stolfo S J. Data Mining approaches for intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2000-12-03.
  • 4Manganaris S, Christensen M, Zerkle D, et al. A data mining analysis of RTID alarms[J]. Computer Networks, 2000,34(4):571-577.
  • 5Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 6Spafford E H,Zamboni D. Intrusion detection using autonomous agents[J]. Computer Networks, 2000,34(4):547-570.
  • 7Lee W, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models[A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C]. Oakland: IEEE, 1999.120-132.
  • 8Lee W, Stolfo S J, Mok K W. Mining audit data to build intrusion detection models[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
  • 9Lee W, Stolfo S J, Mok K W. Mining in a data-flow environment: experience in network intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
  • 10Cannady J, Harrell J. A Comparative analysis of current intrusion detection technologies. In: Proceedings of the 4th Technologies for Information Security Conference, Houston, 1996. 50~57

共引文献37

同被引文献18

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部