期刊文献+

基于聚类分析的数据库入侵检测框架及其应用 被引量:1

Architecture of Database Intrusion Detection Based on Clustered Analysis and its Application
下载PDF
导出
摘要 针对现存数据库入侵检测研究需要纯训练集,该文提出一个基于聚类分析的数据库入侵检测框架,定义了数据库查询的表示方法及其相似度计算方法,研究了框架实现的3个核心算法。算法根据距离函数对原始审计数据进行聚类,并对每个聚类进行标记,利用异常检测引擎对实时查询进行检测。通过实验给出了对合法用户攻击的检测率和误报率,并分析了影响因素。 A new architecture of database intrusion detection based on clustered analysis was proposed. Unlike other manners, it did not ask for clean audit data. The paper defined the expression of database queries and similarity computation between queries. Then three critical algorithm of the architecture were studied. First the audit data was clustered according to the distance function, and each cluster was labeled. After the paper introduced how the detect engineer define the anomaly. Finally an experiment result including the detection rate and false alarm rate on the penetration was reported.
作者 陈怀 楼永坚
出处 《杭州电子科技大学学报(自然科学版)》 2008年第6期83-86,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
关键词 数据库安全 数据挖掘 入侵检测 database security data ming intrusion detection
  • 相关文献

参考文献7

  • 1Bertino E, Terzi E, Kamra A, et al. Intrusion Detection in RBAC- Administered Databases[C]. Washington. Proc of the 21st Annual Computer Security Applications Conf, 2005 :170 - 182.
  • 2Chung C Y, Gertz M, Levitt K. DEMIDS: A Misuse Detection System for Database System[C]. Nowell: Proc of the 13th Annual WIPP TC- 11 WG11.5 Working Conf on Integrity and Internal Control in Information Systems, 1999:123- 137.
  • 3Carl E Landwehr. Database Security Ⅲ[ M]. New York: Elsevier Science Publishing Company Inc, 1990: 159- 178.
  • 4Lee S Y, Low WL, Wong P R. Learning Fingerprints for A Database Intrusion Detection System[C]. London: Lecture Notes in Computer Science, 2002: 264 - 280.
  • 5Yi H, Brajenra P. A Data Mining Approach for Database Intrusion Detection[C]. Nicosia: Proc of the 2004 ACM Symposium on Applied Computing, 2004:711 - 716.
  • 6王丽娜,董晓梅,郭晓淳,于戈.基于数据挖掘的网络数据库入侵检测系统[J].东北大学学报(自然科学版),2003,24(3):225-228. 被引量:30
  • 7Han J,Kambcr M.范明,孟小峰,译.数据挖掘的概念与技术[M].北京:机械工业出版社,2001:3-22.

二级参考文献10

  • 1HANJ KAMBERM 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 2Feiertag R, Rho S, Benzinger L,et al. Intrusion detection inter-component adaptive negotiation[J]. Computer Networks, 2000,34(4):605-621.
  • 3Lee W, Stolfo S J. Data Mining approaches for intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2000-12-03.
  • 4Manganaris S, Christensen M, Zerkle D, et al. A data mining analysis of RTID alarms[J]. Computer Networks, 2000,34(4):571-577.
  • 5Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 6Spafford E H,Zamboni D. Intrusion detection using autonomous agents[J]. Computer Networks, 2000,34(4):547-570.
  • 7Lee W, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models[A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C]. Oakland: IEEE, 1999.120-132.
  • 8Lee W, Stolfo S J, Mok K W. Mining audit data to build intrusion detection models[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
  • 9Lee W, Stolfo S J, Mok K W. Mining in a data-flow environment: experience in network intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
  • 10王丽娜,董晓梅,于戈,王东.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110. 被引量:20

共引文献29

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部