Font Size: a A A

The Research And Implementation Of Database Intrusion Detection System

Posted on:2006-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:G WangFull Text:PDF
GTID:2168360155471701Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the fast development of Internet, computer network has played the more and more important role in the society, economy, culture, and people's life. More and more governments, business and finance having their own databases connected to the internet. Recent report shows that there is a large increase in the attack to these network databases. Then current security is focused on network database security. So we need to study intrusion detection technology on databases to intensify the security.First, The database security problems are introduced. The security mechanism of SQL Server is discussed detailedly. Then the conception of intrusion detection system (IDS) is introduced here. And the function, model and taxonomy of intrusion detection systems are particularly discussed. The application of misuse detection technology and anomaly detection technology in database intrusion detection are talked about in this paper. We show more emphasis on the anomaly detection technology based on data mining.Finally, the database IDS is implemented with misuse detection technology and anomaly detection technology. We show more emphasis on the anomaly detection technology based on data mining. By use of Apriori association rule algorithm, the user's historical data are mined. By comparing the similarities between the history profiles and present ones we can detect the anomaly in present profiles.
Keywords/Search Tags:intrusion detection, database security, misuse detection, anomaly detection, data mining, Apriori algorithm
PDF Full Text Request
Related items