Analysis of Data Dependency Based Intrusion Detection System

被引:0
|
作者
Nugmanov, Yermek [1 ]
Panda, Brajendra [1 ]
Hu, Yi [2 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Northern Kentucky Univ, Dept Comp Sci, Highland Hts, KY 41099 USA
关键词
Database intrusion detection; semantic analyzer; cost analysis; response strategy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research focuses on analyzing the cost effectiveness of a database intrusion detection system that uses dependencies among data items to detect malicious transactions. The model suggested in this paper considers three main factors: the quality of intrusion detection, the probability of intrusion, and the cost structure of an organization whose data is protected by the intrusion detection system. We developed a step by step approach that helps in determining the optimal configuration expressed by the response strategy and the threshold value. The experimental results show that our model is capable of finding the optimal configuration while taking the cost structure of an organization into consideration.
引用
收藏
页码:111 / +
页数:2
相关论文
共 50 条
  • [1] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [2] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [3] An Intrusion Detection System Based on Big Data for Power System
    Zeng, Sicheng
    [J]. Proceedings of the 2016 International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE), 2016, 69 : 322 - 328
  • [4] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    [J]. PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [5] Medical big data intrusion detection system based on virtual data analysis from assurance perspective
    Cai, Yijun
    Li, Dian
    Wang, Yuyue
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021, 12 (06) : 1106 - 1116
  • [6] Medical big data intrusion detection system based on virtual data analysis from assurance perspective
    Yijun Cai
    Dian Li
    Yuyue Wang
    [J]. International Journal of System Assurance Engineering and Management, 2021, 12 : 1106 - 1116
  • [7] The Analysis of Application of Data Mining Technology in the System of Intrusion Detection
    Liu, Zhijun
    Pu, Xiaowei
    [J]. PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 28, 2014, 28 : 75 - 78
  • [8] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [9] Intrusion detection system based on speckle pattern analysis
    Dhall, A
    Chhabra, JK
    Aulakh, NS
    [J]. EXPERIMENTAL TECHNIQUES, 2005, 29 (01) : 25 - 31
  • [10] Intrusion detection system based on speckle pattern analysis
    A. Dhall
    J. K. Chhabra
    N. S. Aulakh
    [J]. Experimental Techniques, 2005, 29 : 25 - 31