期刊文献+

一种基于DBMS的无监督异常检测算法及其应用 被引量:2

An Algorithm of Unsupervised Anomaly Detection Based on DBMS and its Application
在线阅读 下载PDF
导出
摘要 传统的基于身份认证和存取控制的数据库安全机制存在一定的局限性,如无法防止SQL注入、合法用户权限滥用等非法行为,而现存的入侵检测研究多集中在网络和操作系统,由此提出一个基于DBMS的无监督异常检测算法。首先定义了数据库查询的表示方法及其相似度计算方法,其次给出了包括查询聚类、标记和检测三阶段的异常检测算法,最后给出了算法在合成数据中的聚类结果及其在真实数据中检测SQL注入的应用,并讨论了利用数据库索引的扩展算法。 There are limitations on the traditional user identification and access control of database security mechanism, such as in preventing the illegal actions of SQL injection, misusing authorization. However, most of existed intrusion detection researches focus on network or operation system, so the paper presents an algorithm of unsupervised anomaly detection based on DBMS. Firstly, the paper defines the expression of database queries and similarity computation between queries. Then an anomaly detection algorithm that includes three phases: clustering, labeling and detecting is given out. Finally, an experiment result on a synthetic data set and a result on a real data set for detecting SQL injection are reported, and the modified algorithm based on index also is discussed at the end of the paper.
出处 《计算机科学》 CSCD 北大核心 2007年第1期123-127,共5页 Computer Science
基金 航空科学基金(02F52033) 江苏省高技术项目(BG2004-005)资助
关键词 聚类算法 数据库安全 异常检测 Clustering algorithm, Database security, Anomaly detection
  • 相关文献

参考文献9

  • 1Anley C.Advanced SQL Injection In SQL Server Applications.http://www.nextgenss.com/papers/advanced__sql_injection.pdf,2002
  • 2Christina Y C,Michael G,Karl L.DEMIDS:A Misuse Detection System for Database Systems.In:Proc.of the Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems.Amsterdam,Netherlands,1999.158~178
  • 3Lee S Y,Low W L,Wong P R.Learning Fingerprints for A Database Intrusion Detection System.In:ESORICS 2002.Lecture Notes in Computer Science,No 2502 Springer-Verlag,2002.264~280
  • 4Zhong Y,Qin X L.Research on Algorithm of User Query Frequent Itemsets Mining.In:Proc.of Third International Conference on Machine Learning and Cybernetics.Shanehai,China,Aug.2004.1671~1676
  • 5Yi H,Brajendra P.A data mining approach for database intrusion detection.In:Proc.of the 2004 ACM Symposium on Applied Computing.Nicosia,Cyprus,March 2004.711~716
  • 6Portnoy L,Eskin E,Solfo S.Intrusion detection with unlabeled data using clustering.In:Proc.of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001).Philadelphia,PA:November,2001
  • 7Moses S C.Similarity estimation techniques from rounding algorithms.In:Proc.of the thirty-fourth annual ACM symposium on Theory of computing.Montreal,Quebec,Canada,2002.380~388
  • 8IBM Quest Market-Basket Synthetic Data Generator.http://www.cs.indiana.edu/~cgiannel/assoc-gen.html
  • 9O'NeillM 著 冉晓旻 郭文伟译.Web服务安全技术与原理[M].北京:清华大学出版社,2003.168-169.

共引文献1

同被引文献10

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部