Font Size: a A A

Research Andapplication Of Database Security Audit Analysis

Posted on:2012-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:N N LuFull Text:PDF
GTID:2178330332495997Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of database technology, it brings the convenience to people, but its security has also been paid more attention day by day. The database safety mechanism has also become the topic which the numerous scholars study unceasingly. The traditional protection database's security uses the status authentication, the access control and so on. But any guard is impossible to achieve absolutely safe, once the aggressor has broken these safety controls, the database security will be threaten once more. The audit mechanism has become the last barrier of protection database security. It may trace the attack through the audit, and gains aggressor's effective evidence.The auditing system is mainly composed of data acquisition and data analyzer. Now, some mainstream database provided the log mechanism which solved the data acquisition. However, facing the magnanimous audit data, analyzing data is a weak link. Seeking for an analysis method with high effective and high accuracy is also the key point which studied by numerous scholars.In view of this question, this article has studied the Oracle database audit mechanism primarily, specially has studied the Oracle log mechanism. Then it has studied the data mining, and according to the data mining theory, it has applied the data mining technology in the log audit analysis of database. According to the characteristic of log, it has proposed a model which unifies by association rules and sequence pattern to gain the user normal behavior pattern and build the user normal behavior pattern storehouse and then examine the user current behavior.At the same time, this paper has also discussed the representative the algorithm of association rule mining and sequence pattern mining, especially the FP- growth algorithm and the PrefixSpan algorithm. And it has made the improvement to the FP- growth algorithm. The improved algorithm has constructed reverse FP-tree with a binary tree storage structure. In mining process, it mines left son tree recursively, but gets frequent mode not by generating conditional FP-Tree. The experiments show that the improved algorithm can realize effective mining on the time and space.Finally, it has designed a database audit analysis system which analysis data in the method of association rules and sequence pattern, and then forms the user normal behavior pattern storehouse to examine the user the behavior.
Keywords/Search Tags:database security, audit log, data mining, association rules, sequence pattern
PDF Full Text Request
Related items