A clustering method based on data queries and its application in database intrusion detection

被引:0
作者
Zhong, Y [1 ]
Zhu, Z [1 ]
Qin, XL [1 ]
机构
[1] Foshan Univ, Informat & Educ Technol Ctr, Foshan 52800, Peoples R China
来源
PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9 | 2005年
关键词
clustering algorithm; query similarity; intrusion detection; database security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of clustering methods assume that an attribute value of an object has a single value. However, in many fields, an attribute value for an object may be a set or a bag of values, such as the result set of a database query, which can be looked on as a set of attributes, whose values also can be a set or a bag of data. So the clustering problems of queries can be expressed as intersection problems of sets whose element also can be a set or a bag. The paper gives a method to compute similarity among queries and presents a cluster method based on it. The algorithm reads each query q in sequence, either assigning q to an existing cluster or creating q as a new cluster. At last, the application of the algorithm in database intrusion detection is shown and experiment results on synthetic and real data set are reported.
引用
收藏
页码:2096 / 2101
页数:6
相关论文
共 16 条
  • [1] ANLEY C, 2002, ADV SQL INJECT SQL S
  • [2] [Anonymous], 2001, P ACM CSS WORKSH DAT
  • [3] Christina Y.C., 1999, P 3 ANN IFIP TC 11 W, P158
  • [4] Ester M., 1996, 2 INT C KNOWL DISCOV, P226, DOI DOI 10.5555/3001460.3001507
  • [5] Squeezer: An efficient algorithm for clustering categorical data
    He, ZY
    Xu, XF
    Deng, SC
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (05) : 611 - 624
  • [6] Lee SY, 2002, LECT NOTES COMPUT SC, V2502, P264
  • [7] Cyclic allocation of two-dimensional data
    Prabhakar, S
    Abdel-Ghaffar, K
    Agrawal, D
    El Abbadi, A
    [J]. 14TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 1998, : 94 - 101
  • [8] Sheikholeslami G., 1998, Proceedings of the Twenty-Fourth International Conference on Very-Large Databases, P428
  • [9] SUDIPTO G, 1999, P 1999 INT C DAT ENG, P512
  • [10] SUDIPTO G, 1998, P ACM SIGMOD INT C M, P103