Database Intrusion Detection using Weighted Sequence Mining

被引:4
|
作者
Srivastava, Abhinav [1 ]
Sural, Shamik [1 ]
Majumdar, A. K. [2 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Data dependency; Weighted Sequence mining; Intrusion detection; E-R Model;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on web-based on-line transactions, the threat of security violations has also increased. Since a database stores valuable information of an application, its security has started getting attention. An intrusion detection system (IDS) is used to detect potential violations in database security. In every database, some of the attributes are considered more sensitive to malicious modifications compared to others. We propose an algorithm for finding dependencies among important data items in a relational database management system. Any transaction that does not follow these dependency rules are identified as malicious. We show that this algorithm can detect modification of sensitive attributes quite accurately. We also suggest an extension to the Entity-Relationship (E-R) model to syntactically capture the sensitivity levels of the attributes.
引用
收藏
页码:8 / 17
页数:10
相关论文
共 50 条
  • [1] Database intrusion detection using weighted sequence mining
    School of Information Technology, Indian Institute of Technology, Kharagpur, 721302, India
    不详
    J. Comput., 2006, 4 (8-17):
  • [2] Database intrusion detection using sequence alignment
    Kundu, Amlan
    Sural, Shamik
    Majumdar, A. K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (03) : 179 - 191
  • [3] Database intrusion detection using sequence alignment
    Amlan Kundu
    Shamik Sural
    A. K. Majumdar
    International Journal of Information Security, 2010, 9 : 179 - 191
  • [4] Weighted intra-transactional rule mining for database intrusion detection
    Srivastava, Abhinav
    Sural, Shamik
    Majumdar, A. K.
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 611 - 620
  • [5] DATABASE INTRUSION DETECTION USING SEQUENTIAL DATA MINING APPROACHES
    Abd Elaziz, Pakinam Elamein
    Sobh, Mohamed
    Mohamed, Hoda K.
    2014 9TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2014, : 104 - 111
  • [6] An Effective Log Mining Approach for Database Intrusion Detection
    Hu, Yi
    Campan, Alina
    Walden, James
    Vorobyeva, Irina
    Shelton, Justin
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [7] Weighted LSTM for intrusion detection and data mining to prevent attacks
    Amar, Meryem
    El Ouahidi, Bouabid
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2020, 12 (03) : 308 - 329
  • [8] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306
  • [9] Implementation of sequence patterns mining in network intrusion detection system
    Yang, XR
    Song, QB
    Shen, JY
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E19 - E23
  • [10] Mining Inter-transaction Data Dependencies for Database Intrusion Detection
    Hu, Yi
    Panda, Brajendra
    INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 67 - +