Role of Soft Outlier Analysis in Database Intrusion Detection

Author(s):  
Anitarani Brahma ◽  
Suvasini Panigrahi
2020 ◽  
Vol 5 (19) ◽  
pp. 32-35
Author(s):  
Anand Vijay ◽  
Kailash Patidar ◽  
Manoj Yadav ◽  
Rishi Kushwah

In this paper an analytical survey on the role of machine learning algorithms in case of intrusion detection has been presented and discussed. This paper shows the analytical aspects in the development of efficient intrusion detection system (IDS). The related study for the development of this system has been presented in terms of computational methods. The discussed methods are data mining, artificial intelligence and machine learning. It has been discussed along with the attack parameters and attack types. This paper also elaborates the impact of different attack and handling mechanism based on the previous papers.


2014 ◽  
Vol 556-562 ◽  
pp. 2886-2889
Author(s):  
Nuo Wang ◽  
Yan Li ◽  
Li Min Yuan

Different from the traditional single databases, there is a big difference between different layers’ data of multi-level database. The differentiation of categorical attributes is small. Traditional database intrusion detection process is simply to consider the point to point data detection between the layers, without considering the similarity between the layers and ignoring the optimization for detected properties of the applied classification between the levels, resulting in lower detection accuracy. In order to avoid the above-mentioned defects of the conventional algorithm, this paper propos an intrusion detection model of multi-layered network by introducing the coarse-to-fine concept. The intrusion feature of computer database is extracted to be used as the basis for intrusion detection of database. The particle swarm distinguish tree is established to make the hierarchical processing for nodes. Through the probability operation of database intrusion detection in different layers, intrusion detection of multi-layer, distributed and large differences database can be achieved. Experimental results show that the use of the intrusion detection algorithm for multi-layer, distributed and large differences database, can increase the security of the database, ensure the safe operation of the database.


Sign in / Sign up

Export Citation Format

Share Document