首页> 外文会议>Computational Intelligence in Cyber Security, 2009. CICS '09 >Detection of intrusive activity in databases by combining multiple evidences and belief update
【24h】

Detection of intrusive activity in databases by combining multiple evidences and belief update

机译:通过结合多种证据和信念更新来检测数据库中的侵入性活动

获取原文

摘要

In this paper, we propose an innovative approach for database intrusion detection which combines evidences from current as well as past behavior of users. It consists of four components, namely, rule-based component, belief combination component, security sensitive history database component and Bayesian learning component. The rule-based component consists of a set of well-defined rules which give independent evidences about a transaction's behavior. An extension of Dempster-Shafer's theory is used to combine multiple such evidences and an initial belief is computed. First level inferences are made about the transaction depending on this initial belief. Once the transaction is found to be suspicious, belief is updated according to its similarity with malicious or genuine transaction history using Bayesian learning. Experimental evaluation shows that the proposed intrusion detection system can effectively detect intrusive attacks in databases without raising too many false alarms.
机译:在本文中,我们提出了一种用于数据库入侵检测的创新方法,该方法结合了来自用户当前和过去行为的证据。它由四个组件组成,分别是基于规则的组件,信念组合组件,安全敏感历史数据库组件和贝叶斯学习组件。基于规则的组件由一组定义明确的规则组成,这些规则提供有关交易行为的独立证据。 Dempster-Shafer理论的扩展用于组合多个此类证据,并计算出初始置信度。根据此最初的信念对交易进行第一级推断。一旦发现交易可疑,就使用贝叶斯学习根据信念与恶意或真实交易历史的相似性来更新信念。实验评估表明,所提出的入侵检测系统可以有效地检测数据库中的入侵攻击,而不会引起过多的虚警。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号