Statistical and fuzzy approach for database security

被引:0
|
作者
Lu, Gang [1 ]
Yi, Junkai [1 ]
Lue, Kevin [2 ]
机构
[1] Beijing Inst Chem Technol, Sch Informat Sci & Technol, Beijing 100029, Peoples R China
[2] Brunel Univ, Uxbridge UB8 3PH, Middx, England
关键词
D O I
10.1109/FSKD.2007.531
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on statistical and fuzzy set theories for Cumulated Anomaly, is proposed. DDM can measure the dubiety degree of each database transaction quantitatively. Software system architecture to support the DDM for monitoring database transactions is designed. We also implemented the system and tested it. Our experimental results show that the DDM method is feasible and effective.
引用
收藏
页码:670 / +
页数:2
相关论文
共 50 条
  • [21] A statistical approach to the generation of a database for evaluating OCR software
    Brundick F.S.
    Brodeen A.E.M.
    Taylor M.S.
    [J]. International Journal on Document Analysis and Recognition, 2002, 4 (3) : 170 - 176
  • [22] Contextual Ranking of Database Querying Results: A Statistical Approach
    Li, Xiang
    Feng, Ling
    Zhou, Lizhu
    [J]. SMART SENSING AND CONTEXT, PROCEEDINGS, 2008, 5279 : 126 - 139
  • [23] A fuzzy approach for mining association rules in a probabilistic database
    Pei, Bin
    Chen, Dingjie
    Zhao, Suyun
    Chen, Hong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [24] The design of a fuzzy system shell using a database approach
    Lu, Kun-Yung
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (04) : 3049 - 3057
  • [25] An active fuzzy object-oriented database approach
    Bostan-Korpeoglu, B
    Yazici, A
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, PROCEEDINGS, 2004, : 885 - 889
  • [26] A Statistical Approach to the Assessment of Security threats Information System
    Semin, Valeriy G.
    Kabanov, Artem S.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 100 - 105
  • [27] A GRAPH THEORETIC APPROACH TO STATISTICAL-DATA SECURITY
    GUSFIELD, D
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (03) : 552 - 571
  • [28] Security Evaluation of Optical CDMA System with Statistical Approach
    Yokohama, Tomohiro
    Tsujioka, Testuo
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,, 2009, : 1575 - 1579
  • [29] Database and Database Application Security
    Said, Huwida
    Guimaraes, Mario
    Maamar, Zakaria
    Jololian, Leon
    [J]. ITICSE 2009: PROCEEDING OF THE 2009 ACM SIGSE ANNUAL CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2009, : 90 - 93
  • [30] Fuzzy clustering approach to evaluating power system security
    Moghaddas, A
    Prasad, NR
    [J]. 42ND MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, PROCEEDINGS, VOLS 1 AND 2, 1999, : 925 - 928