CID: a novel clustering-based database intrusion detection algorithm

Author(s):  
Mohamad Reza Keyvanpour ◽  
Mehrnoush Barani Shirzad ◽  
Samaneh Mehmandoost
2014 ◽  
Vol 556-562 ◽  
pp. 2886-2889
Author(s):  
Nuo Wang ◽  
Yan Li ◽  
Li Min Yuan

Different from the traditional single databases, there is a big difference between different layers’ data of multi-level database. The differentiation of categorical attributes is small. Traditional database intrusion detection process is simply to consider the point to point data detection between the layers, without considering the similarity between the layers and ignoring the optimization for detected properties of the applied classification between the levels, resulting in lower detection accuracy. In order to avoid the above-mentioned defects of the conventional algorithm, this paper propos an intrusion detection model of multi-layered network by introducing the coarse-to-fine concept. The intrusion feature of computer database is extracted to be used as the basis for intrusion detection of database. The particle swarm distinguish tree is established to make the hierarchical processing for nodes. Through the probability operation of database intrusion detection in different layers, intrusion detection of multi-layer, distributed and large differences database can be achieved. Experimental results show that the use of the intrusion detection algorithm for multi-layer, distributed and large differences database, can increase the security of the database, ensure the safe operation of the database.


2014 ◽  
Vol 530-531 ◽  
pp. 705-708
Author(s):  
Yao Meng

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.


Sign in / Sign up

Export Citation Format

Share Document