Font Size: a A A

The Database Intrusion Detection Technology

Posted on:2009-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:X R LiFull Text:PDF
GTID:2208360245957270Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Now database security mainly relies on the traditional database security mechanisms, with the growth of database security needs, and especially the development of computer network, prevention-oriented database security mechanism has been unable to meet the growing needs of the database security. Therefore, the database security mechanism has to be more proactive and positive to more effectively prevent the database from the endless attacks of Internet.By detecting the activities and running status of system, Intrusion Detection System finds unauthorized access and malicious acts. Although intrusion detection has made many great achievements, they mostly focus on the area of network and operating systems, database intrusion detection research are less involved. Applying Intrusion detection technology to database is an effective method to offer the database a proactive and positive security mechanism.In this paper, the database intrusion detection technologies, especially anomaly detection based on data mining has been deeply researched, and proposed a trie-based implementation of Apriori algorithm, which is used to extract user behavior rules in association rule. Developed a Database Management System(DBMS) based on the Berkeley DB storage engine, then designed a prototype of database intrusion detection system, which implemented the detection function. At last, some the relevant experiments and analysis were done.
Keywords/Search Tags:Database Intrusion Detection, Anomaly Detection, Apriori algorithm, Berkeley DB
PDF Full Text Request
Related items