期刊文献+

数据库入侵检测的一种数据挖掘方法 被引量:3

A data mining approach for database intrusion detection
下载PDF
导出
摘要 针对在数据库系统中检测恶意事务提出了一种数据挖掘方法。该方法挖掘数据库中各数据项事务之间的数据关联规则,所设计的数据关联规则挖掘器主要用来挖掘与数据库日志记录相关的数据。不符合关联规则的事务作为恶意事务。试验证明该方法可以有效的检测到恶意事务。
出处 《计算机系统应用》 2005年第11期49-52,共4页 Computer Systems & Applications
  • 相关文献

参考文献5

  • 1Yi Hu , Brajendra Panda. A Data Mining Approach for Database Intrusion Detection. ACM Symposium on Applied Computing, 2004. (3):711 -716. 被引量:1
  • 2Javitz, H. S. and Valdes, A. The SRI IDES Statistical Anomaly Detector. In Proceedings of the IEEE Symposium on Security and Privacy, 1991, (5) . 被引量:1
  • 3Fawcett, T. and Provost F. Adaptive Fraud Detection. Data Mining and Knowledge Discovery, 1997,177 -181. 被引量:1
  • 4Barbara, D., Goel, R., and Jajodia, S. Mining Malicious Data Corruption with Hidden Markov Models. In Proceedings of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England, July 2002. 被引量:1
  • 5Lee, V. C.S., Stankovic, J. A., Son, S. H. Intrusion Detection in Real- time Database Systems Via Time Signatures. In Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium,2000. 被引量:1

同被引文献13

  • 1赵宝献,秦小麟.数据库访问控制研究综述[J].计算机科学,2005,32(1):88-91. 被引量:17
  • 2黄志国,韩慧莲.基于安全审计的数据库安全[J].科技情报开发与经济,2005,15(12):228-229. 被引量:11
  • 3Carter D L,Katz A J. Computer Crime: An Emerging Challenge for Law Enforcement[EB/OL]. (1996-12- 1) [ 2009 - 04 - 05 ] http ://findartieles. corn/p/articles/ mi_m2194/is n12_v65/ai_19102819/? tag= content;coll. 被引量:1
  • 4Chung C Y, Gertz M , Levitt K. DEMIDS: A Misuse Detection System for Database Systems [M]. Norwell. Kluwer Academic Publishers, 2000. 被引量:1
  • 5Sandhu, Coyne E J, Feinstein H L. Role-based Access Control Models[J]. IEEE Computer, 1996,29(2) : 38. 被引量:1
  • 6Youman C E, Sandhu R S, Coyne E J. Rationale for the RBAC96 Family of Access Control Models[C]// Proceedings of the 1st ACM Workshop on Role-Based Access Control. New York: ACM, 1996. 被引量:1
  • 7Sandhu R, Bhamidipati V, Munawer Q. The AR- BAC97 Model for Role-Based Administration of Roles [J]. ACM Transactions on Information and System Security, 1999,2 (1): 105. 被引量:1
  • 8Sandhu R, Bhamidipati. Role-Based Administration of User-Role Assignment: The URA97 Model and Its Oracle Implementation[J]. Journal of Computer Security, 1999(7):176. 被引量:1
  • 9Ferraiolo D F, Sandhu R, Gavrila S. Proposed NIST Standard for Role;based Access Control [J ]. ACM Transaction on Information and System Security, 2001,4(3) :224. 被引量:1
  • 10Chung C Y, Gertz M, Levitt K N. Discovery of Multi-level Security Policies[J]. Database Security, 2000(22) : 173. 被引量:1

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部