首页 | 本学科首页   官方微博 | 高级检索  
     

基于用户查询模式的挖掘算法及其在入侵检测中的应用
引用本文:钟勇,秦小麟,包磊. 基于用户查询模式的挖掘算法及其在入侵检测中的应用[J]. 应用科学学报, 2005, 23(5): 506-512
作者姓名:钟勇  秦小麟  包磊
作者单位:南京航空航天大学信息科学与技术学院, 江苏南京 210016
基金项目:航空科学基金(02F52033),江苏省高技术(BG2004-005)资助项目
摘    要:利用用户查询结构和属性结构的稳定性特征提出了一个事务级用户查询模式挖掘算法,该方法应用在数据库入侵检测系统中,可以有效地防止SQL注入、合法用户权限滥用等非法行为,并对该算法的实现、复杂度、应用作了阐述,最后对算法的查询性能影响作了分析.

关 键 词:数据库安全  数据挖掘  入侵检测  
文章编号:0255-8297(2005)05-0506-07
收稿时间:2004-06-03
修稿时间:2004-06-032004-10-08

Mining Algorithm Based on User Query and Its Application in Intrusion Detection
ZHONG Yong,QIN Xiao-lin,BAO Lei. Mining Algorithm Based on User Query and Its Application in Intrusion Detection[J]. Journal of Applied Sciences, 2005, 23(5): 506-512
Authors:ZHONG Yong  QIN Xiao-lin  BAO Lei
Affiliation:Institute of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
Abstract:As traditional user identification and access control of database security mechanism have limitations such as inability of resisting illegal SQL injection and abuse of authorization, a transaction-level user query profiles mining algorithm is presented by using characteristics of structure stabilization of user queries and attributes. The method can be used for database intrusion detection to effectively prevent these illegal actions. Implementation, complexity and application of the algorithm are discussed, and influence of the algorithm on the database query analyzed.
Keywords:intrusion detection  database security  data mining  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《应用科学学报》浏览原始摘要信息
点击此处可从《应用科学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号