使用顺序数据挖掘方法的数据库入侵检测

Pakinam Elamein Abd Elaziz, M. Sobh, H. K. Mohamed
{"title":"使用顺序数据挖掘方法的数据库入侵检测","authors":"Pakinam Elamein Abd Elaziz, M. Sobh, H. K. Mohamed","doi":"10.1109/ICCES.2014.7030937","DOIUrl":null,"url":null,"abstract":"The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.","PeriodicalId":339697,"journal":{"name":"2014 9th International Conference on Computer Engineering & Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Database intrusion detection using sequential data mining approaches\",\"authors\":\"Pakinam Elamein Abd Elaziz, M. Sobh, H. K. Mohamed\",\"doi\":\"10.1109/ICCES.2014.7030937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.\",\"PeriodicalId\":339697,\"journal\":{\"name\":\"2014 9th International Conference on Computer Engineering & Systems (ICCES)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 9th International Conference on Computer Engineering & Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2014.7030937\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 9th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2014.7030937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

检测数据库信息层面上的任何违规或侵入的程序取决于将事务所做操作的正常行为和实践置于其后,任何识别出的非正常模式或行为都有可能被视为入侵或侵犯。在这个过程中,一个已知的问题是,检测数据库中频繁模式的过程的准确性,因为所应用的算法可能无法检测到所有的模式,这将在两个方面产生影响。首先,正常模式的数据库将会丢失。其次,在检测过程中会遗漏一些新的模式。本文研究并实现了不同的顺序数据挖掘技术,在此基础上提出了一种新的增强算法。该算法提高了过程的准确性和检测模式的数量。最后,提出了基于改进算法的数据库入侵检测模型。本文使用一个真实的庞大数据库来评估其性能和准确性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Database intrusion detection using sequential data mining approaches
The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Simulations and performance evaluation of Real-Time Multi-core Systems An Enhanced Queries Scheduler for query processing over a cloud environment EMD thresholding and denoising inspired by wavelet technique A proposed SNOMED CT ontology-based encoding methodology for diabetes diagnosis case-base A proposed framework for robust face identification system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1