Pakinam Elamein Abd Elaziz, M. Sobh, H. K. Mohamed
{"title":"使用顺序数据挖掘方法的数据库入侵检测","authors":"Pakinam Elamein Abd Elaziz, M. Sobh, H. K. Mohamed","doi":"10.1109/ICCES.2014.7030937","DOIUrl":null,"url":null,"abstract":"The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.","PeriodicalId":339697,"journal":{"name":"2014 9th International Conference on Computer Engineering & Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Database intrusion detection using sequential data mining approaches\",\"authors\":\"Pakinam Elamein Abd Elaziz, M. Sobh, H. K. Mohamed\",\"doi\":\"10.1109/ICCES.2014.7030937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.\",\"PeriodicalId\":339697,\"journal\":{\"name\":\"2014 9th International Conference on Computer Engineering & Systems (ICCES)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 9th International Conference on Computer Engineering & Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2014.7030937\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 9th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2014.7030937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Database intrusion detection using sequential data mining approaches
The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.