• ورود به سامانه
      مشاهده مورد 
      •   صفحهٔ اصلی
      • نشریات انگلیسی
      • The ISC International Journal of Information Security
      • Volume 6, Issue 2
      • مشاهده مورد
      •   صفحهٔ اصلی
      • نشریات انگلیسی
      • The ISC International Journal of Information Security
      • Volume 6, Issue 2
      • مشاهده مورد
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      A hybrid approach for database intrusion detection at transaction and inter-transaction levels

      (ندگان)پدیدآور
      Doroudian, M.Shahriari, H. R.
      Thumbnail
      دریافت مدرک مشاهده
      FullText
      اندازه فایل: 
      769.5کیلوبایت
      نوع فايل (MIME): 
      PDF
      نوع مدرک
      Text
      ORIGINAL RESEARCH PAPER
      زبان مدرک
      English
      نمایش کامل رکورد
      چکیده
      Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks in both database transaction level and inter-transaction level (user task level). For this purpose, we propose a detection method at transaction level, which is based on describing the expected transactions within the database applications. Then at inter-transaction level, we propose a detection method that is based on anomaly detection and uses data mining to find dependency and sequence rules. The main advantage of this system, in comparison with the previous database intrusion detection systems, is that it can detect malicious behaviors in both transaction and inter-transaction levels. Also, it gains advantages of a hybrid method, including specification-based detection and anomaly detection, to minimize both false positive and false negative alarms. In order to evaluate the accuracy of the proposed system, some experiments have been done. The experiment results demonstrate that the true positive rate (recall metric) is higher than 80%, and the false positive rate is lower than 10% per different data sets and choosing appropriate ranges for support and confidence thresholds. The experimental evaluation results show high accuracy and effectiveness of the proposed system.
      کلید واژگان
      Intrusion Detection
      Database Security
      State machine
      Inter-Transaction Dependency
      Inter-Transaction Sequence

      شماره نشریه
      2
      تاریخ نشر
      2014-07-01
      1393-04-10
      ناشر
      Iranian Society of Cryptology

      شاپا
      2008-2045
      2008-3076
      URI
      https://dx.doi.org/10.22042/isecure.2015.6.2.5
      http://www.isecure-journal.com/article_39158.html
      https://iranjournals.nlai.ir/handle/123456789/73418

      مرور

      همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

      حساب من

      ورود به سامانهثبت نام

      تازه ترین ها

      تازه ترین مدارک
      © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
      تماس با ما | ارسال بازخورد
      قدرت یافته توسطسیناوب