首页> 外文期刊>Journal of Intelligent Information Systems >Detecting intrusion transactions in database systems: a novel approach
【24h】

Detecting intrusion transactions in database systems: a novel approach

机译:在数据库系统中检测入侵事务:一种新颖的方法

获取原文
获取原文并翻译 | 示例
       

摘要

The security of computers and their networks is of crucial concern in the world today. One mechanism to safeguard information stored in database systems is an Intrusion Detection System (IDS). The purpose of intrusion detection in database systems is to detect malicious transactions that corrupt data. Recently researchers are working on using data mining techniques for detecting such malicious transactions in database systems. Their approach concentrates on mining data dependencies among data items. However, the transactions not compliant with these data dependencies are identified as malicious transactions. Algorithms that these approaches use for designing their data dependency miner have limitations. For instance, they need to experimentally determine appropriate settings for minimum support and related constraints, which does not necessarily lead to strong data dependencies. In this paper we propose a new data mining algorithm, called the Optimal Data Access Dependency Rule Mining (ODADRM), for designing a data dependency miner for our database IDS. ODADRM is an extension of k-optimal rule discovery algorithm, which has been improved to be suitable in database intrusion detection domain. ODADRM avoids many limitations of previous data dependency miner algorithms. As a result, our approach is able to track normal transactions and detect malicious ones more effectively than existing approaches.
机译:当今世界,计算机及其网络的安全至关重要。一种保护数据库系统中存储的信息的机制是入侵检测系统(IDS)。数据库系统中入侵检测的目的是检测破坏数据的恶意交易。最近,研究人员正在致力于使用数据挖掘技术来检测数据库系统中的此类恶意交易。他们的方法集中于挖掘数据项之间的数据依赖性。但是,不符合这些数据依赖性的事务被识别为恶意事务。这些方法用于设计其数据依赖矿机的算法具有局限性。例如,他们需要实验确定最小支持和相关约束的适当设置,这不一定会导致强烈的数据依赖性。在本文中,我们提出了一种新的数据挖掘算法,称为最佳数据访问依赖规则挖掘(ODADRM),用于为数据库IDS设计数据依赖挖掘器。 ODADRM是k最优规则发现算法的扩展,已对其进行了改进以适合数据库入侵检测领域。 ODADRM避免了以前的数据依赖挖掘器算法的许多限制。结果,与现有方法相比,我们的方法能够更有效地跟踪正常交易并检测到恶意交易。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号