{"title":"光学和监督学习方法在数据库入侵检测中的应用","authors":"Sharmila Subudhi, T. Behera, S. Panigrahi","doi":"10.1109/CINE.2017.10","DOIUrl":null,"url":null,"abstract":"Database security has become a prime concern in today's internet world due to the escalation of various web applications and information systems. Ensuring the security of the back-end databases is highly essential for maintaining the confidentiality and integrity of the stored sensitive information. In this paper, a Density-based clustering technique, namely, OPTICS, has been applied for constructing the normal profile of users. Each incoming transaction either lies within a cluster or is found to deviate from the clusters based on its Local Outlier Factor value. The transactions observed as outliers are further verified by employing various supervised machine learning techniques individually – Naïve Bayes, Decision Tree, Rule Induction, k-Nearest Neighbor and Radial Basis Function Network. The effectiveness of our system is demonstrated by carrying out extensive experimentations and comparative analysis using stochastic models.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection\",\"authors\":\"Sharmila Subudhi, T. Behera, S. Panigrahi\",\"doi\":\"10.1109/CINE.2017.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Database security has become a prime concern in today's internet world due to the escalation of various web applications and information systems. Ensuring the security of the back-end databases is highly essential for maintaining the confidentiality and integrity of the stored sensitive information. In this paper, a Density-based clustering technique, namely, OPTICS, has been applied for constructing the normal profile of users. Each incoming transaction either lies within a cluster or is found to deviate from the clusters based on its Local Outlier Factor value. The transactions observed as outliers are further verified by employing various supervised machine learning techniques individually – Naïve Bayes, Decision Tree, Rule Induction, k-Nearest Neighbor and Radial Basis Function Network. The effectiveness of our system is demonstrated by carrying out extensive experimentations and comparative analysis using stochastic models.\",\"PeriodicalId\":236972,\"journal\":{\"name\":\"2017 3rd International Conference on Computational Intelligence and Networks (CINE)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Computational Intelligence and Networks (CINE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINE.2017.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINE.2017.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection
Database security has become a prime concern in today's internet world due to the escalation of various web applications and information systems. Ensuring the security of the back-end databases is highly essential for maintaining the confidentiality and integrity of the stored sensitive information. In this paper, a Density-based clustering technique, namely, OPTICS, has been applied for constructing the normal profile of users. Each incoming transaction either lies within a cluster or is found to deviate from the clusters based on its Local Outlier Factor value. The transactions observed as outliers are further verified by employing various supervised machine learning techniques individually – Naïve Bayes, Decision Tree, Rule Induction, k-Nearest Neighbor and Radial Basis Function Network. The effectiveness of our system is demonstrated by carrying out extensive experimentations and comparative analysis using stochastic models.