[go: up one dir, main page]

Hashemi et al., 2008 - Google Patents

Detecting intrusion transactions in databases using data item dependencies and anomaly analysis

Hashemi et al., 2008

View PDF
Document ID
10935864717161697093
Author
Hashemi S
Yang Y
Zabihzadeh D
Kangavari M
Publication year
Publication venue
Expert Systems

External Links

Snippet

The purpose of the intrusion detection system (IDS) database is to detect transactions that access data without permission. This paper proposes a novel approach to identifying malicious transactions. The approach concentrates on two aspects of database …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Alam et al. Phishing attacks detection using machine learning approach
Liu et al. Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise
Nguyen et al. Design and implementation of intrusion detection system using convolutional neural network for DoS detection
Bilge et al. Riskteller: Predicting the risk of cyber incidents
JP7302019B2 (en) Hierarchical Behavior Modeling and Detection Systems and Methods for System-Level Security
Basnet et al. Rule-based phishing attack detection
CN119254489B (en) Information network security self-defense method and system based on trusted computing
Kim et al. Empirical evaluation of SVM-based masquerade detection using UNIX commands
Stolfo et al. A comparative evaluation of two algorithms for windows registry anomaly detection
Srivastava et al. Database Intrusion Detection using Weighted Sequence Mining.
Dutt et al. Real-time hybrid intrusion detection system using machine learning techniques
Alazab et al. Using response action with intelligent intrusion detection and prevention system against web application malware
Sahasrabuddhe et al. Survey on intrusion detection system using data mining techniques
Mohammadi et al. New class‐dependent feature transformation for intrusion detection systems
EP4024252B1 (en) A system and method for identifying exploited cves using honeypots
Hashemi et al. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
Datta et al. Real-time threat detection in ueba using unsupervised learning algorithms
Sohrabi et al. Detecting intrusion transactions in database systems: a novel approach
Montaruli et al. Raze to the ground: Query-efficient adversarial html attacks on machine-learning phishing webpage detectors
Adebiyi et al. An SQL injection detection model using chi-square with classification techniques
Niranjan et al. Security in data mining-a comprehensive survey
Elshoush et al. Intrusion alert correlation framework: An innovative approach
Patil et al. Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis.
CN117792741A (en) Network attack detection and source tracing method based on behavioral characteristic analysis
Wei et al. WebHound: a data-driven intrusion detection from real-world web access logs