期刊文献+

基于密度聚类的数据库入侵检测系统研究 被引量:5

On Database Intrusion Detection System Based on Density Clustering
下载PDF
导出
摘要 针对现有数据库入侵检测系统高误报率的问题,提出了一种基于密度聚类数据库入侵检测系统,其检测系统过程分为2个部分,①数据训练阶段:执行事务属性的数据预处理,然后将数据集划分为训练集和测试集,使用点排序识别聚类结构(Ordering of Points To Identify Clustering Structure,OPTICS)来构建用户的正常配置文件;②入侵检测阶段:每个传入行为有2种状态,位于群集内或是集群外,根据其局部异常因子(Local Outlier Factor,LOF)值来确定事务的异常程度,对于LOF<1的行为允许访问数据库,其他行为通过采用不同的监督机器学习技术进一步验证是正常值或异常值,实现入侵检测.实验结果表明,与其他现有数据库入侵检测系统相比,本文系统性能优于其他2种系统. Aiming at the problem of high false positive rate of existing database intrusion detection systems, a database intrusion detection system based on density clustering was proposed in this paper. The intrusion detection system is divided into two parts.①Data training stage: in this stage, data preprocessing of transaction attributes is executed, and then the data set is divided into training set and testing set. And ordering of points to identify clustering structure(OPTICS) is used to construct the user’s normal configuration file;②Intrusion detection stage: each incoming behavior has two states, located within or outside the cluster, and the degree of abnormality of the transaction is determined by its local outlier factor(LOF) value. For LOF<1 behavior allows access to the database, for other behaviors, through the use of different supervised machine learning technology to further verify that the normal/abnormal value, to achieve intrusion detection. The experimental results show that compared with other existing database intrusion detection systems, the performance of this system is better than the other two systems.
作者 曹德胜 CAO De-sheng(School of Computer Science, North China Institute of Science and Technology, Beijing 065201, China)
出处 《西南师范大学学报(自然科学版)》 CAS 北大核心 2019年第5期103-108,共6页 Journal of Southwest China Normal University(Natural Science Edition)
基金 中央国家机关支持项目(2011B026)
关键词 入侵检测 密度聚类 点排序识别聚类结构 局部异常因子 监督学习 intrusion detection density clustering ordering points to identify clustering structure local outlier factor supervised learning
  • 相关文献

参考文献4

二级参考文献40

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2Dean J, Ghemawat S. MapReduce:simplified data processing on large clusters [ J ]. CACM,2008,51 ( 1 ) :107 - 113.
  • 3Apache Hadoop [ EB/OL ]. (2014-06-30). http ://hadoop. apache, org.
  • 4White T. Hadoop :the Definitive Guide [ M ]. California: O' Reilly Media, 2012.
  • 5Pokorny J. Nosql databases:a step to database scalability in web envi- ronment [ J]. International Journal of Web Information Systems ,2013,9 (1) :69-82.
  • 6Amazon DynamoDB [ EB/OL]. http://aws, amazon, com/dynamodb/.
  • 7Plugge E, Hawkins T, Membrey P. The Definitive Guide to MongoDB : the NoSQL Database for Cloud and Desktop Computing[ M ]. Berkely, CA, USA: Apress ,2010.
  • 8Chang F, Dean J, Ghemawat S, et al. Bigtable : A distributed storage sys- tem for structured data [ J ]. ACM Transactions on Computer Systems, 2008,26(2) :4.
  • 9Dede E, Sendir B, Kuzlu P, et al. An evaluation of Cassandra for Ha- doop[ C ]//Cloud Computing (CLOUD) ,2013 IEEE Sixth Internation- al Conference on. IEEE,2013:494 -501.
  • 10Fadika Z, Dede E, Govindaraju M, et al. Benchmarking MapReduce im- plementations for application usage scenarios [ C ]//Grid Computing (GRID), 2011 12th IEEE/ACM International Conference on. IEEE, 2011:90 -97.

共引文献75

同被引文献71

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部