Data Mining Based Database Intrusion Detection System : A Survey *

Significant security problem for database system is unfriendly encroach a user or software. Intruder is one of the most publicized threats to security. Database is a most valuable asset of any organization or companies. This paper presents the feature of data mining based database intrusion detection system. In addition the paper gives general guidance for open research area and future direction. The objective of this survey is to give the researcher a broad overview of the work that has been done at the collaboration between intrusion detection and

[1]  Yi Hu,et al.  A data mining approach for database intrusion detection , 2004, SAC '04.

[2]  Shamik Sural,et al.  Database intrusion detection using sequence alignment , 2010, International Journal of Information Security.

[3]  Elisa Bertino,et al.  Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[4]  Yong Zhong,et al.  Database intrusion detection based on user query frequent itemsets mining with item constraints , 2004, InfoSecu '04.

[5]  Abhinav Srivastava,et al.  Speeding Up Web Access Using Weighted Association Rules , 2005, PReMI.

[6]  Philip S. Yu,et al.  Efficient mining of weighted association rules (WAR) , 2000, KDD '00.

[7]  Fionn Murtagh,et al.  Weighted Association Rule Mining using weighted support and significance framework , 2003, KDD '03.

[8]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[9]  Sin Yeung Lee,et al.  Learning Fingerprints for a Database Intrusion Detection System , 2002, ESORICS.

[10]  Abdul Hanan Abdullah,et al.  Unsupervised Clustering Methods for Identifying Rare Events in Anomaly Detection , 2007 .

[11]  Jiong Yang,et al.  STING: A Statistical Information Grid Approach to Spatial Data Mining , 1997, VLDB.

[12]  Abhinav Srivastava,et al.  Database Intrusion Detection using Weighted Sequence Mining , 2006, J. Comput..

[13]  Michael Gertz,et al.  DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.