An approach for database intrusion detection based on the event sequence clustering

Li Yinzhao*, Yang Dongxu, Ren Jiadong, Hu Changzhen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Database intrusion detection technology is an important part of the database security. The paper presents a new database intrusion detection method based on the event sequence clustering. Firstly, aiming at computing the similarity of two SQL statement sequences, an improved edit distance function is defined. The corresponding clustering results are obtained by the computed similarity. Secondly, the attack sequences are detected by calculating the similarity between user's operation sequences and cluster center. The association between two operation sequences is analyzed. At last, the experimental results show that our approach has lower false alarm rate and higher accuracy rate.

Original languageEnglish
Title of host publicationNCM 2009 - 5th International Joint Conference on INC, IMS, and IDC
Pages584-588
Number of pages5
DOIs
Publication statusPublished - 2009
EventNCM 2009 - 5th International Joint Conference on Int. Conf. on Networked Computing, Int. Conf. on Advanced Information Management and Service, and Int. Conf. on Digital Content, Multimedia Technology and its Applications - Seoul, Korea, Republic of
Duration: 25 Aug 200927 Aug 2009

Publication series

NameNCM 2009 - 5th International Joint Conference on INC, IMS, and IDC

Conference

ConferenceNCM 2009 - 5th International Joint Conference on Int. Conf. on Networked Computing, Int. Conf. on Advanced Information Management and Service, and Int. Conf. on Digital Content, Multimedia Technology and its Applications
Country/TerritoryKorea, Republic of
CitySeoul
Period25/08/0927/08/09

Keywords

  • Clustering
  • Database intrusion detection
  • Event sequence

Fingerprint

Dive into the research topics of 'An approach for database intrusion detection based on the event sequence clustering'. Together they form a unique fingerprint.

Cite this