期刊文献+

基于免疫原理的数据库入侵检测方法研究 被引量:2

Research on Database Intrusion Detection Technology Based on Immune Theory
下载PDF
导出
摘要 基于免疫原理,提出一种数据库入侵检测方法,利用SQL Server 2000的事件探查器完成了对历史审计数据和测试数据的采集,实现了基于免疫的数据库异常检测方法.为了验证提出算法的有效性,在相同测试集上,同基于关联规则的数据库异常检测和基于序列模式的数据库异常检测的方法进行了实验数据比较,结果表明基于免疫的数据库入侵检测在降低漏报率和假报率,提高检测率和正确率方面优于其他两种方法,具有较好的性能. In this paper, an intrusion detection approach for Database proposed based on immune theory, the Microsoft SQL Server 2000 profiler was utilized to collection history audit data and test data. , the anomaly detection algorithrn for database based on immunology was implemented. To validate the validity of the proposed algorithm, applied to the same testing data. , the existing association rule mining anomaly detection method and sequential pattern mining anomaly detection method was compared on experimental data. The results show that the database intrusion detection based on immunology is better than the other two methods in reducing the failing and false report ratio and promoting detection ratio and correct ratio, is more effective.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第12期2343-2347,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60873199)资助
关键词 数据库入侵检测 异常检测 关联规则挖掘 序列模式挖掘 免疫原理 database intrusion detection anomaly detection association rule mining sequential pattern mining immune theory
  • 相关文献

参考文献3

二级参考文献31

  • 1Carter,Katz. Computer crime: an emerging challenge for law enforcement. FBI Law Enforcement Bulletin,December 1996. 1~8.
  • 2Sielken R S. Application intrusion detection:[Technical Report CS-99-17]. Department of Computer Science,University of Virginia,June 1999.
  • 3Liu P. Architectures for Intrusion Tolerant Database Systems.In:Proc. of 18th Annual Computer Security Applications Conf.San Diego California, December 09-13,2002.
  • 4Chung C Y,Gertz M,Levitt K. Discovery of Multi-Level Security Policies. In: The Fourteenth Annual IFIP WG 11. 3 Working Conf. on Database Security, Schoorl, The Netherlands, August 21-23,2000. 173~184.
  • 5Ingsriswang S, Liu P. AAID: An Application Aware Transaction-Level Database Intrusion Detection System: [Technical Report]. Dept. of Information Systems,UMBC,2001.?A?A
  • 6Lee S Y, Low W L, Wong P Y. Learning Fingerprints For A Database Intrusion Detection System. In: 7th European Symposium on Research in Computer Security (ESORICS 2002),Switzerland,October 2002. D Gollmann,G Karjoth,M Waidner.Lecture Notes in Computer Science,No 2502 Springer- Verlag,2002. 264~280.
  • 7National Computer Security Center, Auditing Issues in Secure Database Management Systems: [NCSC Technical Report-005].Volume 4/5,May 1996.
  • 8Sandhu R,Chen F. Constraints for role-based access control. In:Proc. of the first ACM Workshop on Role-based access control,Gaithersburg, Maryland, United States, November 30 - December 02,1995,14.
  • 9Sandhu R,Munawer Q. The ARBAC99 Model for Administration of Roles. In:Proc. of the 15th Annual Computer Security Applications Conf. December 06-10,1999. 229.
  • 10Jajodia S, Liu P, McCollum C D. Application-Level Isolation to Cope With Malicious Database Users. In: 14th Annual Computer Security Applications Conf. Phoenix, Arizona. December 7-11,1998. 73~82.

共引文献15

同被引文献13

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部