期刊文献+

多层分布式大型差异数据库优化入侵检测仿真 被引量:12

Optimized Intrusion Detection Simulation on Multi- tier Distributed and Large Differences Database
下载PDF
导出
摘要 研究多层分布式大型差异数据库入侵准确检测的问题。与传统的单层数据库不同,多层数据库的层次之间的数据存在较大的差异,分类属性的差异化较小,传统的数据库入侵检测过程只是简单考虑了层与层之间的点对点数据检测,没有考虑层与层之间的相似性,放弃了应用层次间分类对检测属性的优化,导致检测准确性不高。为了避免上述传统算法的缺陷,提出了一种基于粒子群辨别树算法的多层分布式大型差异数据库入侵检测方法。提取计算机数据库的入侵特征,并且将其作为数据库入侵检测的依据。建立粒子群辨别树,对节电进行分层处理,通过运算不同层上的数据库入侵检测的概率,从而实现多层分布式大型差异数据库的入侵检测。实验结果表明,利用上述算法进行多层分布式大型差异数据库的入侵检测,可以提高数据库的安全性,保证数据库的安全运行。 In this paper, the accurately intrusion detection problems in multi-tier distributed and large differences database were researched. Different from the traditional single-database, there exists a big difference between multi- level data in the multi-tier database, and the difference is small categorical attributes. In the traditional database in- trusion detection process, it only simply considers the point-to-point data detection between the layers, without con- sidering the similarities between the layers, and gives up the optimization for detected attribute by application level classification, resulting in accurate detection is not high. To avoid these shortcomings of traditional algorithm, this paper presented an intrusion detection method based on particle swarm identification tree algorithm for multi-tier dis- tributed and large differences database. We extracted the features of a computer database intrusion and used it as a basis for the database, then created a PSO to identify the tree, treated the point by layer, and through the probability operation of the database on the different layers in intrusion detection, achieved intrusion detection in multi-tier dis- tributed and larger differences database. The experimental results show that the algorithm applied in intrusion detec- tion of multilayer distributed and large difference database can improve the security of the database and ensure the safe operation of database.
作者 郑义
出处 《计算机仿真》 CSCD 北大核心 2013年第11期400-403,共4页 Computer Simulation
关键词 分布式 数据库 入侵检测 Distributed Database Intrusion detection
  • 相关文献

参考文献10

二级参考文献80

  • 1杜树新,吴铁军.回归型加权支持向量机方法及其应用[J].浙江大学学报(工学版),2004,38(3):302-306. 被引量:22
  • 2Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 3Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 4Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 5Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.
  • 6Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456.
  • 7Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996.
  • 8Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997.
  • 9Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999.
  • 10Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez,David Isacoff, Eugene Spafford, Diego Zamboni. An architecture for intrusion detection using autonomous agents [R]. CERIAS Technical Report 98/05, June 11,1998.

共引文献382

同被引文献105

引证文献12

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部