期刊文献+

一种基于事务时序图的恶意事务检测算法

Detection algorithm of malicious transactions based on transaction-profile chart
下载PDF
导出
摘要 为了提高对数据库恶意事务的检测粒度和检测范围,在基于事务时序图的数据库管理系统恶意事务入侵检测机制的基础上,通过增加记录条件短语,扩展了审计表内容,增加节点属性,改进了合法事务时序图,提出了一种基于合法事务时序图的恶意事务检测算法。该算法可以使检测粒度细到查询语句条件级,而且能检测单语句事务等一些特殊事务。实验表明,该算法具有更强的检测能力、更广的适用范围及较好的性能,并能方便地应用于实际的数据库管理系统中。 To enhance the detection granularity and detection scope on database malicious transaction, a detecting mechanism of malicious transactions based on transaction-profile chart for DataBase Management System (DBMS) was proposed. It expanded the content of audit table through recording the conditional command, and improved the legal transaction-profile chart by adding node attributes. A detection algorithm of malicious transactions based on transaction-profile chart was proposed. This algorithm was endowed with better detection ability on condition phrase of Structured Query Language (SOL) command, which could detect some special malicious transactions such as the one-command transaction, etc. Experimental results indicated that this algorithm had good detection ability, performance and more extensive detection scopes. This algorithm could be applied in practical DBMS.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2008年第6期1230-1235,共6页 Computer Integrated Manufacturing Systems
基金 国家预研基金资助项目(513150601)。~~
关键词 信息安全 数据库管理系统 审计表 事务时序 恶意事务检测 information security database management system audit table transaction profile malicious transactions detection
  • 相关文献

参考文献15

  • 1BERTINO E, SANDHU R. Database security-concepts, approaches, and challenges[J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1) : 2-19. 被引量:1
  • 2ZHANG C N, HONGLAN Z. An integrated approach for database security and fault tolerance[C]//Proceedings of International Conference on Information Technology: Coding and Computing (ITCC'04). Los Alamitos, Cal. USA:IEEE Computer Sciety, 2004:762-766. 被引量:1
  • 3AMMANN P, JAJODIA S, LIU P. Recovery from malicious transactions[J]. IEEE Transactions on Knowledge and Data Engineering , 2002, 14(5):1167-1185. 被引量:1
  • 4郑吉平,秦小麟,钟勇,孙瑾.基于SPN模型的可生存性DBMS中恶意事务修复算法的研究[J].计算机学报,2006,29(8):1480-1486. 被引量:11
  • 5LOW W L, LEE S Y, TEOH P. DIDAFIT: detecting intrusions in databases through fingerprinting transactions [C]// Proceedings of the 4th International Conference on Enterprise Information Systems (ICEIS). Los Alamitos, Cal. , USA: IEEE Computer Society, 2002 : 264-269. 被引量:1
  • 6LEE S Y, LOW W L, WONG P Y. Learning fingerprints for a database intrusion detection system[C]//Proceedings of the 7th European Symposium on Research in Computer Security. Berlin, Germany: Springer, 2002:264-279. 被引量:1
  • 7HU Y, PANDA B. Identification of malicious transactions in database systems [C]//Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS'03). Los Alamitos, Cal., USA: IEEE Computer Society, 2003:329-335. 被引量:1
  • 8HU Y, PANDA B. A data mining approach for database intrusion detection[C]//Proceedings of 2004 ACM Symposium on Applied Computing. New York, N. Y. , USA: ACM Press, 2004,711-716. 被引量:1
  • 9LEE W, STOLFO S. Data mining approaches for intrusion detection[C]//Proceedings of the 7th USENIX Security Symposium. Berkeley, Cal. , USA:IEEE,1998:79-94. 被引量:1
  • 10PANDA B, TRIPATHY S. Data dependeney based logging for defensive information warfare[C]//Proeeedings of 2000 ACM Symposium on Applied Computing. New York,N. Y. , USA:ACM Press, 2000: 361-365. 被引量:1

二级参考文献18

  • 1Panda B., Haque K. A., Extended data dependency approach:A robust way of rebuilding database. In: Proceedings of the 2002 ACM Symposium on Applied Computing, New York,2000, 446-452 被引量:1
  • 2Panda B. , Tripathy S.. Data dependency based logging for defensive information warfare. In: Proceedings of the 2000 ACM Symposium on Applied Computing, New York, 2000, 361365 被引量:1
  • 3Hu Y. , Panda B.. Identification of malicious transactions in Database Systems. In: Proceedings of the 7th International Database Engineering and Applications Symposium, 2003, 329-335 被引量:1
  • 4Liu P. , Jing J. , Luenam P. , Wang Y. , Li L. , Ingsriswang S.. The design and implementation of a self-healing database system. Journal of Intelligent Information Systems, 2004, 23(3): 247-269 被引量:1
  • 5Bernstein P. A. , Hadzilacos V. , Goodman N.. Concurrency Control and Recovery in Database Systems. Addison-Wesley,1987 被引量:1
  • 6Liu P.. Architectures for intrusion tolerant database systems.In: Proceedings of the 18th Annual Computer Security Applications Conference, 2002, 311-320 被引量:1
  • 7Luenam P. , Liu P.. ODAM: An on-the-fly damage assessment and repair system for commercial database applications.In: Proceedings of the 15th IFIP WG 11.3 Working Conference on Database and Application Security, Ontario, Canada, 2001,239-252 被引量:1
  • 8Liu P. , Jajodia S.. Multi-phase damage confinement in database systems for intrusion tolerance. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, 2001,191-205 被引量:1
  • 9Dugan J. B. , Trivedi K. S. , Geist R. M. , Nicola V. F.. Extended stochastic Petri nets.. Applications and analysis[Ph. D.dissertation]. Department of Electrical Engineering, Duke University, 1984 被引量:1
  • 10Miner A. S,. Computing response time distributions using stochastic Petri nets and matrix diagrams. In: Proceedings of the 10th International Workshop on Petri Nets and Performance Models, Urbana-Champaign, IL, USA, 2003, 10-19 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部