期刊文献+

一种基于主动学习的数据库恶意行为检测方法

A Malware Detection Method Based On Active Learning For Database
原文传递
导出
摘要 本文针对现有恶意软件检测系统无法保证数据库恶意行为检测的效率和精度的问题,设计了一个基于机器学习中主动学习原理的数据库恶意行为检测方法并在MySQL上实现了原型系统。测试表明该系统对数据库恶意行为检测具有较高的检测率,较低的误报率和漏报率。 First,the conception of malicious behavior characteristics signatures from the database session behavior is defined.Then,the risk factor to describe the dangers of the malicious behavior of a short sequence is proposed.Last,the risk rand is introduced to divide the software into malicious software and normal software.And a prototype system is developed in MySQL.The experimental results show that the malicious behavior detection correct rate of about 82% with this method which has a high detection correct rate and a low false alarm rate and false negative rate.
作者 车晶 张瑛
机构地区 南京邮电大学
出处 《网络安全技术与应用》 2012年第10期62-64,共3页 Network Security Technology & Application
关键词 数据库管理系统 恶意行为检测 机器学习 MYSQL Databse security Malware detection Intrusion detection Behavior signature Machine Learning Active Learning
  • 相关文献

参考文献5

  • 1钟勇,秦小麟.数据库入侵检测研究综述[J].计算机科学,2004,31(10):15-18. 被引量:18
  • 2Jerne N K. Towards a Network Theory of the Immune System 1974,Annual Immunology, vol. 125c.
  • 3S.Forrest,A S Perelson,R Cherukuri. Self-Nonself Discrimination in a Computater. 1994.5.Proceeding of IEEE Symposium on Research in Security and Privacy.
  • 4Steven A. Hofraeyr amd S.Forrest Architecture for an Artificial Immune System 2000.Journal of Evolutionary Computation.
  • 5赵敏,王红伟.AIB—DBIDM:一种基于人工免疫的数据库入侵检测模型.计算机研究与发展.2009.

二级参考文献27

  • 1Stolfo S,Fan D,Lee W. Credit card fraud detection using metalearning: Issues and initial results. In:Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997
  • 2Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy, Chalmers University of Technology, Dept. of Computer Engineering, Go'' teborg, Sweden: [Technical Report 99-15]. 2000
  • 3Allen J,et al. State of the Practice of Intrusion Detection Technologies: [Technical Report CMU/SEI-99-TR-028 ]. ESC-99-028, Carnegie Mellon University, Software Engineering Institute, Jan. 2000
  • 4Sielken R S. Application intrusion detection: [Technical Report CS-99-17]. Department of Computer Science, University of Virginia, June 1999
  • 5Qian X,et al. Detection and elimination of inference channels in multilevel relational database systems. In: Proc. of the 1993IEEE Symposium on Research in Security and Privacy, 1993.196-205
  • 6Dawson S, et al. Maximizing Sharing of Protected Information.Journal of Computer and System Science, 2002, 64(3): 496-541
  • 7Hinke T H,Delugach H,Wolf R. A framework for inference-directed data mining. In: Proc. Tenth IFIP Working Conf.Database Security, Como, Italy, July 1996
  • 8Thuraisingham, Bhavani M. Security Checking in Relational Database Management Systems Augmented with Inference Engines. Computers and Security, 1987,6: 479 - 492
  • 9Yip R,Levitt K. Data Level Inference Detection in Database Systems. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998. 179-189
  • 10McDermott J,Goldschlag D. Storage jamming. In: D. Spooner,S. Demurjian,J. Dobson, eds. Database Security Ⅸ: Status and Prospects,Chapman & Hall, London, 1996. 365- 381

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部