Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction
暂无分享,去创建一个
Mohammad Talebi | Mostafa Doroudian | Narges Arastouie | Ali Reza Ghanbarian | N. Arastouie | A. Ghanbarian | M. Doroudian | Mohammad Talebi
[1] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[2] James F. Allen. Maintaining knowledge about temporal intervals , 1983, CACM.
[3] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[4] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[5] Elisa Bertino,et al. Profiling Database Application to Detect SQL Injection Attacks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[6] Elisa Bertino,et al. Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.
[7] Abhinav Srivastava,et al. Weighted Intra-transactional Rule Mining for Database Intrusion Detection , 2006, PAKDD.
[8] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[9] Yi Hu,et al. Identification of malicious transactions in database systems , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..
[10] BertinoElisa,et al. Detecting anomalous access patterns in relational databases , 2008, VLDB 2008.
[11] Dhiren R. Patel,et al. Machine learning proposed approach for detecting database intrusions in RBAC enabled databases , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[12] Yi Hu,et al. Mining Inter-transaction Data Dependencies for Database Intrusion Detection , 2008, SCSS.
[13] Joseph Lee,et al. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions , 2002, ICEIS.
[14] Elisa Bertino,et al. Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[15] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.
[16] Victor C. S. Lee,et al. Intrusion detection in real-time database systems via time signatures , 2000, Proceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000.