期刊文献+

一种数据库入侵检测模型的设计 被引量:2

Design of a model of database intrusion detection
下载PDF
导出
摘要 为检测数据库管理系统中的异常事务,提出了一种新的数据库入侵检测模型。该模型运用数据挖掘方法从用户历史会话记录中挖掘用户SQL模板频繁序列,构建用户轮廓。检测时依据用户会话异常度来判断是否发生入侵,既可以有效检测异常事务,又可以避免因为一两次误用把无辜用户误认为恶意攻击者。该模型检测粒度得当,维护较简单。 In order to detect anomalous transactions in a DBMS, a new intrusion detection method is proposed. The method is capable of extracting user profiles from the normal historical audit data by using the AprioriAll algorithm. Since whether a session is abnormal or not is determined by its degree of abnormity, the model can not only detect abnormal transactions efficiently, but it can also avoid mistaking an innocent user for a malicious attacker. Its detection granularity is finer and its maintenance is much easier.
作者 蔡敏 叶震
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第4期537-540,共4页 Journal of Hefei University of Technology:Natural Science
关键词 入侵检测 用户轮廓 SOL模板 intrusion detection user profile SQL template
  • 相关文献

参考文献7

  • 1文俊浩,徐玲,李立新,徐传运.安全增强的数据库系统的模型构建[J].计算机应用,2005,25(8):1734-1736. 被引量:7
  • 2Chung C Y, Gertz M, Levitt K. DEMIDS: a misuse detection system for database systems[C]//Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems. Amsterdam, Netherlands: Kluwer Academic Publishers, 1999:159 - 178.
  • 3Vieira M,Madeira H. Detection of malicious transactions in DBMS[C]//Proceedings of the llth IEEE International Symposium Pacific Rim Dependable Computing. Washington, DC, USA: IEEE Computer Society, 2005:350-357.
  • 4Yao Q,An A, Huang X. Finding and analyzing database user sessions[C]//Proceedings of the 10th International Conference on Database Systems for Advanced Applications, Berlin: Springer, 2005:851-862.
  • 5Bertino E, Terzi E, Vakali A, et al. Intrusion detection in RBAC-admlnistered databases[C']//Proceedings of the 21st Annual Computer Security Applications Conference. Washington DC, USA: IEEE Computer Society, Z005, 170-182.
  • 6刘大勇,张玉清.事务级数据库入侵检测系统的设计[J].中国农业大学学报,2006,11(4):109-113. 被引量:2
  • 7Forrest S, Hofmeyr S A, Somayaji A, et al, A sense of self for unix processes[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996:120-128.

二级参考文献19

  • 1HectorGarcia-Molina 杨冬青 唐世渭 徐其钧 等译.数据库系统实现[M].北京:机械工业出版社,2001.18.
  • 2LUNT T, DENNING D, SCHELL R, et al. The SeaView Security Model[ J]. IEEE TRANSACTION ON SOFTWARE ENGINEERING,1990, 16(6).
  • 3AMERICAREBECCAGURLEYBACE 陈明奇 译.人侵检测[M].北京:人民邮电出版社,2001.151-165.
  • 4LUENAM P, LIU P. The design of an adaptive intrusion tolerant database system[ A]. Proceedings of IEEE Workshop on Intrusion Tolerant Systems[ C]. 2002.
  • 5Bertino E,Sandhu R.Database security-concepts,approaches,and challenges[J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19
  • 6Low W L,Joseph L.DIDAFIT:Detecting intrusions in databases through fingerprinting transactions[C].Spain:International Conference on Enterprise Information Systems,2002:264-269
  • 7Luenam P,Liu P.The design of an adaptive intrusion tolerant database system.Proc[J].IEEE Workshop on Intrusion Tolerant Systems (ITS '02),2002,7:14-21
  • 8Ammann P,Jajodia S.Recovery from malicious transactions[J].IEEE Transactions on Knowledge and Data Engineering,2002,15(5):1167-1185
  • 9Lee W,Stolfo S J.Data mining approaches for intrusion detection[C].San Antonio:Proceedings of the 7th USENIX Securtiy Symposium,1998:533-567
  • 10Chung C Y,Gertz M.DEMIDS:A misuse detection system for database systems[C].Amsterdam:In Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems,1999,11:159-178

共引文献7

同被引文献9

  • 1闫红岩,李秦伟,刘明坤.密文数据库系统应用程序接口的研究与设计[J].贵州科学,2007,25(1):35-38. 被引量:2
  • 2Shmueli E,Waisenberg R, Elovici Y, et al. Designing secure in- dexes for encrypted databases[C]// Proc of the IFIP Conf on Database and Applications Security, LNCS 3654. Heiddberg, Berlin: Springer-Verlag, 2005 : 54- 68.
  • 3Estrind, Tsudik G. Visa scheme for inter-organization net work security[C]//Proc of the 1987 Symposium on Securi- ty and Privacy. New York: IEEE, 1987: 174--183.
  • 4Emekci F, Agrawal D, Abbadi A E, et al. Privacy preser ring query processing using third parties[C]//Barga R S, Zhou X F. Proc of the Int Conf on Data Engineering. Wash- ington: IEEE Computer Society Press, 2006: 27.
  • 5Oracle Corporation. Architecture of Oracle Net Services [Z]. Oraclegi Net Services Administrator's Guide Release 2 (9.2) :Part Number A96580-02.
  • 6Wong R. Oracle Net8 Administrator' s Guide Release 8. 0 [Z]. December, 1997 : A58230-01.
  • 7Mykletun E, NarasimhaM, TsudikG. Authentication and integrity'in outsourceddatabases[J]. ACMTrans on Stor- age,2006,2(2):107--138.
  • 8沈苏彬.一种面向网络基础设施的安全模型及其控制机制[C]//国家重大科学基金研究计划"网络与信息安全"2002年度学术交流论文集.2002:519-526.
  • 9蔡敏,汪世义,梁宝华.一种基于粗糙集理论的数据库入侵检测模型[J].信息化纵横,2009(6):11-14. 被引量:1

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部