期刊文献+

数据库入侵检测研究综述 被引量:18

A Survey on the Database Intrusion Detection
在线阅读 下载PDF
导出
摘要 网络的发展使数据库面临的安全形势更加复杂,而传统的以预防为中心的数据库安全机制存在不足,在此基础上总结了数据库入侵检测技术的发展现状,指出了在此方面进行研究的难点和需要解决的关键问题,最后对今后的发展趋势进行了展望。 With the development of network, database faces more serious security situation. Traditional prevention-centric security is not enough. Based on the problem the paper summaries the status of database intrusion detection techniques and points out the difficulties of research and the existing problems that need to be solved. Finally, the fu-ture direction in this field is discussed.
作者 钟勇 秦小麟
出处 《计算机科学》 CSCD 北大核心 2004年第10期15-18,共4页 Computer Science
基金 航空科学基金(编号:02F52033)
关键词 数据库安全 入侵检测技术 网络 安全形势 中心 关键问题 发展现状 发展趋势 机制 研究综述 Database intrusion detection,Database security, Intrusion tolerant
  • 相关文献

参考文献27

  • 1Liu P. Architectures for Intrusion Tolerant Database Systems.In:Proc. of 18th Annual Computer Security Applications Conf.Las Vegas, Nevada, Dec. 2002
  • 2Ammann P,Jajodia S,McCollum C D, Blaustein B T. Surviving information warfare attacks on databases. In:Proc. of the IEEE Symposium on Security and Privacy,Oakland, CA, May 1997.164-174
  • 3Carter,Katz. Computer crime: an emerging challenge for law enforcement. FBI Law Enforcement Bulletin,Dec. 1996
  • 4Castano S,Fugini M G,Martella G,Samarati P. Database Security. Addison-Wesley, 1995
  • 5Ferraiolo D,Sandhu R,Gavrila S,Kuhn D,Chandramouli R. Proposed NIST Standard for Role -Based Access Control. ACM TISSEC,2001,4(3)
  • 6Lippmann R, et al. Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In: Proc. of 2000 DARPA Information Survivability Conference and Exposition, Jan. 2000
  • 7Stolfo S,Fan D,Lee W. Credit card fraud detection using metalearning: Issues and initial results. In:Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997
  • 8Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy, Chalmers University of Technology, Dept. of Computer Engineering, Go'' teborg, Sweden: [Technical Report 99-15]. 2000
  • 9Allen J,et al. State of the Practice of Intrusion Detection Technologies: [Technical Report CMU/SEI-99-TR-028 ]. ESC-99-028, Carnegie Mellon University, Software Engineering Institute, Jan. 2000
  • 10Sielken R S. Application intrusion detection: [Technical Report CS-99-17]. Department of Computer Science, University of Virginia, June 1999

同被引文献136

引证文献18

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部