期刊文献+

一种应用级数据库入侵检测方法 被引量:1

METHOD OF APPLICATION-LEVEL DATABASE INTRUSION DETECTION
下载PDF
导出
摘要 目前,国内外入侵检测技术主要集中在网络和操作系统层,而对处于信息存储和管理核心位置的数据库,却很少有相应的入侵检测机制。提出一种应用级数据库入侵检测方法,从单个SQL语句结构、SQL语句操作的数据和应用系统操作行为三个层面进行入侵检测。既对用户"做什么"进行了检测,又进一步检测用户"怎么做",从而避免应用系统漏洞导致的数据库安全威胁。 At present,intrusion detection methods at home or abroad all focused on the network and operating system layer,but only little related intrusion detection mechanism is for database,where is the core of information storage and management.In this paper,a database application-level intrusion detection method is proposed.We carry out intrusion detection from three aspects such as the SQL statement structure,the data the SQL operated and the behaviour of Application system.In this way,we can comprehensively and carefully detect what users did and how they did.Thus we can prevent the security menace of the database from the vulnerability of application systems.
出处 《计算机应用与软件》 CSCD 2010年第4期280-282,285,共4页 Computer Applications and Software
关键词 数据库入侵检测 数据库安全 入侵检测 Database intrusion detection Database security Intrusion detection
  • 相关文献

参考文献15

  • 1Adrian Spalka,J L.A Comprehensive Approach to Anomaly Detection in Relational Databases[C]//Proceedings of Data and Applications Security XIX.19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security,Storrs,CT,USA,August 7-10,2005.Berlin:Springer-Verlag,c2005.
  • 2Fredrik Valeur,D M,Giovanni Vigna.A Learning-Based Approach to the Detection of SQL Attacks:DIMVA 2005[C]//Proceedings of Detection of Intrusions and Malware,and Vulnerability Assessment.Second International Conference,Vienna,July 7-8,2005.Berlin:Springer-Verlag,c2005.
  • 3Hu Y,Panda B.Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems[J].Journal of Network and Systems Management,2005,13(3):269-291.
  • 4Ashish Kamra,E T,Elisa Bertino.Detecting anomalous access patterns in relational databases[J].The VLDB Journal,2007,17(5):1063-1077.
  • 5Abhinav Srivastava,S S,Majumdar A K.Weighted Intra-transactional Rule Mining for Database Intrusion Detection[C]//Proceedings of Applications of Evolutionary Computing.EvoWorkshops 2006,Budapest,April 10-12,2006.Berlin:Springer-Verlag,c2006.
  • 6曹忠升,李晶.安全数据库系统中在线入侵检测的设计与实现[J].计算机工程与科学,2005,27(9):16-18. 被引量:3
  • 7张勇,冯玉才,朱虹.基于距离度量的关系数据库系统用户行为轮廓的挖掘[J].计算机工程与应用,2003,39(20):13-14. 被引量:5
  • 8戴臻,费洪晓,李俊,谢文彪,肖新华.基于特定模式树的用户行为关联规则挖掘算法[J].计算机系统应用,2007,16(5):56-59. 被引量:7
  • 9钟勇,秦小麟,包磊.基于用户查询模式的挖掘算法及其在入侵检测中的应用[J].应用科学学报,2005,23(5):506-512. 被引量:2
  • 10Jae-Chul Park,B N N.SQL Injection Attack Detection:Profiling of Web Application Parameter Using the Sequence Pairwise Alignment:WISA2006[C]//Proceedings of the 7th International Workshop on Information Security Applications,Jeju Island,August 28-30,2006.Heidelberg:Springer Verlag,c2008.

二级参考文献27

  • 1李玲娟,王汝传.一种基于数据挖掘的入侵检测系统模型[J].南京邮电学院学报(自然科学版),2005,25(5):40-43. 被引量:2
  • 2.GB 1785-1999.中华人民共和国国家标准:计算机信息系统安全保护等级划分准则[S].,1999..
  • 3..《计算机信息系统安全保护等级划分准则》应用指南(技术要求)通用要求[S].,..
  • 4朱战时 刘天时.数据结构-使用C语言 第二版[M].西安交大出版社,2000..
  • 5Common Criteria for Information Technology Security Evaluation,Part 2:Security functional requirements.29-30.
  • 6C Chung,M Gertz,K Levitt.DEMIDS:A Misuse Detection System for Database Systems[C].In:Integrity and Internal Control in Information Systems IFIP WG11.5,1999.
  • 7Carter Katz.Computer Crime:an emerging challenge for law enforcement.FBI Law Enforcement Bulletin,1996-12:1-8.
  • 8R Agrawal,R Srikant.Fast algorithms for mining association rules[C]. In:Proceedings of the 20th VLDB Conference,Santiago,Chile,1994.
  • 9Wenke Lee.A Data Mining Framework for Constructing Feature and Models for Intrusion Detection Systems[D].PhD dissertation.Columbia University, 1999.
  • 10H Javitz,A Valdez.The SRI IDES Statistical Anomaly Detector[C].In: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1991:316-326.

共引文献12

同被引文献17

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部