Font Size: a A A

The Research And Implementation Of Database Intrusion Detection System

Posted on:2018-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2348330536957701Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology and Internet technology,Internet and computer equipment from spreading in all walks of life,and has a great influence on people's life and work.However,due to the complexity of the Internet,a variety of network security issues continue to emerge.With the development of network intrusion technology,network security has become the biggest threat to the security of many enterprises and even the entire Internet database.As the core data of the enterprise or the organization,the database may be attacked in the process of access to the Internet or local area network.Therefore,in order to improve the application of Internet technology and database,so that the database technology to bring more value to the enterprise,the research of database security technology is of great significance.The research content of this paper is based on the intrusion behavior of network user and database security theory knowledge,all kinds of network security problems in the enterprise database,association rules Apriori algorithm used in the database user behavior data mining,so as to realize the database for the detection of abnormal intrusion.First,this paper introduces the developing process of the intrusion detection system,then describes the characteristics and classification of intrusion detection system,the intrusion detection technology to do a simple analysis,points out the existing problems of current intrusion detection.Then it introduces the attack behavior of database,and analyzes the security mechanism and international standard of SQL relational database.In the anomaly detection technology based on data mining and intrusion detection technology based on the database,this paper choose the former,then introduces the system model designed in this paper and the important function of the realization of database intrusion detection.Performance requirements are demonstrated by testing.The main innovation of the content included in the analysis of user behavior,the introduction of Apriori algorithm of association rules in data mining,user behavior of common mode and history,through the behavior mode of comparison,detection of the current user's abnormal behavior.The model makes use of the dynamic training and updating of the data to make the system more adaptive.
Keywords/Search Tags:Intrusion detection, Database, Association rules
PDF Full Text Request
Related items