首页> 外文期刊>Expert Systems >Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
【24h】

Detecting intrusion transactions in databases using data item dependencies and anomaly analysis

机译:使用数据项依赖性和异常分析来检测数据库中的入侵事务

获取原文
获取原文并翻译 | 示例
           

摘要

The purpose of the intrusion detection system (IDS) database is to detect transactions that access data without permission. This paper proposes a novel approach to identifying malicious transactions. The approach concentrates on two aspects of database transactions: (1) dependencies among data items and (2) variations of each individual data item which can be considered as time-series data. The advantages are threefold. First, dependency rules among data items are extended to detect transactions that read or write data without permission. Second, a novel behaviour similarity criterion is introduced to reduce the false positive rate of the detection. Third, time-series anomaly analysis is conducted to pinpoint intrusion transactions that update data items with unexpected pattern. As a result, the proposed approach is able to track normal transactions and detect malicious ones more effectively than existing approaches.
机译:入侵检测系统(IDS)数据库的目的是检测未经许可访问数据的事务。本文提出了一种识别恶意交易的新颖方法。该方法集中在数据库事务的两个方面:(1)数据项之间的依赖关系;(2)每个单独的数据项的变化都可以视为时间序列数据。优点是三重的。首先,扩展了数据项之间的依赖性规则,以检测未经许可而读取或写入数据的事务。其次,引入了一种新颖的行为相似性准则,以减少检测的误报率。第三,进行时间序列异常分析以查明以意外模式更新数据项的入侵事务。结果,与现有方法相比,所提出的方法能够跟踪正常交易并更有效地检测恶意交易。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号