Design of A New Intrusion Detection System based on Database

被引:5
|
作者
Wu, Gongxing [1 ]
Huang, Yimin [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
关键词
intrusion detection system; database; anomaly detection;
D O I
10.1109/ICSPS.2009.139
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection analyzes unauthorized accesses and malicious behaviors and rinds intrusion behaviors and attempts by detecting the state and activity of an operation system to provide an effective means for intrusion defense. Applying the intrusion detection technology to databases is an effective method of enabling databases to have positive and active security mechanisms. This paper makes an intensive study of a database intrusion detection technology, especially an anomaly detection technology based on data mining first and then puts forward a kind of realization based on Trie tree for the classical algorithm of association rules---Apriori and finally uses Apriori algorithm to realize the extraction of user behavior rules.
引用
收藏
页码:814 / 817
页数:4
相关论文
共 50 条
  • [1] Design of Intrusion Detection System Based on a New Pattern Matching Algorithm
    Zhang Hu
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 545 - 548
  • [2] Enhancing Detection Rate in Database Intrusion Detection System
    Rao, Udai Pratap
    Singh, Nikhil Kumar
    Amin, Akash R.
    Sahu, Kushal
    [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 556 - 563
  • [3] Learning fingerprints for a database intrusion detection system
    Lee, SY
    Low, WL
    Wong, PY
    [J]. COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 264 - 279
  • [4] Data mining based design for the detection engine of the intrusion detection system
    Lu, Xi-Xiang
    Yang, Bo
    Pei, Chang-Xing
    Su, Xiao-Long
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (04): : 574 - 580
  • [5] A new network intrusion detection system based on blockchain
    Fu J.
    Xu M.
    Huang Y.
    Tao H.
    [J]. International Journal of Performability Engineering, 2019, 15 (12): : 3187 - 3195
  • [6] Innovative Signature Based Intrusion Detection System Parallel Processing and Minimized Database
    Almutairi, Abdullah H.
    Abdelmajeed, Nabih T.
    [J]. 2017 INTERNATIONAL CONFERENCE ON THE FRONTIERS AND ADVANCES IN DATA SCIENCE (FADS), 2017, : 142 - 147
  • [7] System design based on the combination of firewall and intrusion detection technology
    [J]. 2005, Wuhan University of Technology, Wuhan, China (27):
  • [8] Research and Design on Intrusion Detection System Based on Data Mining
    Song, Guoqin
    Guo, Yuanhui
    Qiu, Qianxi
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 188 - 194
  • [9] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [10] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373