2008
DOI: 10.1111/j.1468-0394.2008.00467.x
|View full text |Cite
|
Sign up to set email alerts
|

Detecting intrusion transactions in databases using data item dependencies and anomaly analysis

Abstract: The purpose of the intrusion detection system (IDS) database is to detect transactions that access data without permission. This paper proposes a novel approach to identifying malicious transactions. The approach concentrates on two aspects of database transactions: (1) dependencies among data items and (2) variations of each individual data item which can be considered as time-series data. The advantages are threefold. First, dependency rules among data items are extended to detect transactions that read or w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(29 citation statements)
references
References 21 publications
0
29
0
Order By: Relevance
“…Sensitivity of an attribute signifies how important the attribute is, for tracking against malicious modifications. Researches in [17] also modify the work in [15] by extending the concept of malicious transactions from those that corrupt data to those that either read data or write data or do both without permission. The data-dependency models in [15,16,17] find the association rules between the data items without consideration to who accesses this data.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Sensitivity of an attribute signifies how important the attribute is, for tracking against malicious modifications. Researches in [17] also modify the work in [15] by extending the concept of malicious transactions from those that corrupt data to those that either read data or write data or do both without permission. The data-dependency models in [15,16,17] find the association rules between the data items without consideration to who accesses this data.…”
Section: Related Workmentioning
confidence: 99%
“…Researches in [17] also modify the work in [15] by extending the concept of malicious transactions from those that corrupt data to those that either read data or write data or do both without permission. The data-dependency models in [15,16,17] find the association rules between the data items without consideration to who accesses this data. This may generate a rule that conflicts with access control mechanism for some users, and this will cause false positives and violate the availability of the database for these users.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations