期刊文献+

多信息源数据库入侵检测系统 被引量:2

下载PDF
导出
摘要 通过对数据库安全威胁来源进行分析,建立了多信息源数据库入侵检测系统模型,并给出了系统各部分实现方法。多信息源数据库入侵检测系统可以实现跨信息源安全事件综合关联分析,能够有效减少漏报、误报现象,增强数据库入侵检测系统检测能力。
作者 张洪斌 李娜
机构地区 公安部研究所
出处 《电子商务》 2011年第11期32-33,41,共3页 E-Business Journal
  • 相关文献

参考文献7

  • 1Low W L, Lee S Y,Teoh P. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions. In.. Proc. of the 4th Intl. Conf. on Enterprise Information Systems (ICEIS). 2002.264, 265, 267,269.
  • 2王德强,张锐,谢立,宋娇.数据库安全的研究与进展[J].计算机科学,2002,29(12):26-30. 被引量:4
  • 3刘瑜,陈铁英.Microsoft SQL Server数据库的安全策略及实现方法[J].计算机工程与设计,2003,24(1):68-71. 被引量:26
  • 4WenkeLee, Salvatorej. Stolfo, Kuiw. Mok. Adaptive Intrusion Detection: A Data Mining Approach [J]. Artificial Intelligence Reviewl, 2000,4: 533-567.
  • 5Yip R,Levitt K. Data Level Inference Detection in Database Systems. In.. Proc. of the 1 lth IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998. 179-189.
  • 6Chung C Y,Gertz M, Levitt K. DEMIDS.. A Misuse Detection System for Database Systems. In:The Third Annual IFIP TC-11 WG 11.5 Working Conf. on Integrity and Internal Control in Information Systems, 1999.
  • 7钟勇,秦小麟.数据库入侵检测研究综述[J].计算机科学,2004,31(10):15-18. 被引量:18

二级参考文献46

  • 1微软公司.MicrosoftSQLServer 7.0系统管理[M].北京:北京希望电子出版社,1999..
  • 2Sandhu R S, Samarati P.Access Control: Principles and Practice.IEEE Communications, vol.32, no.9, pp.40~48[SS94]
  • 3Denning D E.Cryptography and Data Security.Addison-Wesley Publishing Company, 1983
  • 4Fernandez E B,Summers R C, Wood C.Database Security and Integrity.Addison-Wesley Publishing Company, 1981
  • 5Lampson W.A Note on the Confinement Problem.Comm.of ACM, Oct.1973
  • 6National Computer Security Center.Polyinstantiation Issues in Multilevel Secure Database Management Systems: [ NCSC Technical Report-005].Volume 3/5, May 1996
  • 7Sandhu R S,Coyne E J, Feinstein H L,Youman C E.Role-Based Access Control Models.IEEE Computer,1996,29(2):38~47
  • 8Denning D E,et al.The SeaView Security Model.In:Proc.IEEE Symposium on Security and Privacy, 1998.218~233
  • 9Sandhu R, Chen Fang.The Multilevel Relational (MLR) Data Model.George Mason University, 1996
  • 10Baraani-Dastijerdi A, Pieprzyk J, Safavi-Naini R.Security In Databases: A Survey Study: [TR-96-02].Department of Computer Science, The University of Wollongong, Wollongong,Australia, 1996

共引文献44

同被引文献15

  • 1杨俊杰,周建中,吴玮,刘芳.改进粒子群优化算法在负荷经济分配中的应用[J].电网技术,2005,29(2):1-4. 被引量:70
  • 2卢硕班.数据库入侵检测系统的设计与分析[D].中山大学,2010.
  • 3McHugh J.Testing intrusion detection systems : a critique of the 1998and 1999 DARPA intrusion detection system evaluations as performed byLincoln Laboratory [J]. ACM transactions on Information and system Securi-ty, 2000,3(4): 262-294.
  • 4Lee S,Low W, Wong P. Learning fingerprints for a database intru-sion detection system [J]. Computer Security — ESORICS 2002,2002:264-279.
  • 5国家计算机网络应急技术处理协调中心.2012年中国互联网网络安全报告[R].北京:国家互联网应急中心.2012.
  • 6国家信息安全漏洞共享平台漏洞列表[EB/OL].[2014-2-18].http : //www.cnvd.org.cn/.
  • 7DOROTHY E,DENNING. An intrusion-detection model[J3. IEEE Transactions on Software Engineering, 1987,13(2) : 23-34.
  • 8DENNING D. An intrusion detection model[J3. IEEE Transactions on Software Engineering, 1987,13(2) 222-232.
  • 9MCHUGH J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory[J]. ACM transactions on Infor mation and system Security,2000, 3(4):262-294.
  • 10LEE S, LOW W, WONG P. Learning fingerprints for a database in- trusion detection system[J]. Computer Security ESORICS, 2002, 2002(2) : 264-279.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部