Using Fp-Growth Algorithm For Database Intrusion Detection.

Overview

Databases are frequent targets of intruders as they contain sensitive information. Database intrusion detection systems are used to detect attacks and security policy breaches on the database. These are also used to reduce the effects of these attacks to keep the database consistent. Mining frequent patterns can be used to implement the intrusion detection systems. In this research, we use Frequent Pattern (FP)-growth algorithm, one of the association algorithms, to mine frequent data items from large databases ...
See more details below
Paperback
$66.50
BN.com price
(Save 3%)$69.00 List Price
Other sellers (Paperback)
  • All (2) from $71.81   
  • New (2) from $71.81   
Sending request ...

More About This Book

Overview

Databases are frequent targets of intruders as they contain sensitive information. Database intrusion detection systems are used to detect attacks and security policy breaches on the database. These are also used to reduce the effects of these attacks to keep the database consistent. Mining frequent patterns can be used to implement the intrusion detection systems. In this research, we use Frequent Pattern (FP)-growth algorithm, one of the association algorithms, to mine frequent data items from large databases without the generation of candidate sets. Repeated database scans are avoided by implementing this algorithm by which both time and resources can be saved. The required statistics from large databases are gathered into a smaller data structure (FP-tree), which is generated with just two database scans. This FP-tree is used to generate frequent patterns in transactions. These patterns are used as profiles to check against future transactions. Transactions that do not match these patterns are identified as malicious transactions. We implement the algorithm to find frequent data units and data objects (read write set). Furthermore, traditional FP-growth algorithm is modified to implement it on the workflows to generate frequent pattern transactions in the workflows. Using a simulation analysis, the efficiency of our approach is verified.
Read More Show Less

Product Details

  • ISBN-13: 9781243410405
  • Publisher: BiblioLabsII
  • Publication date: 9/1/2011
  • Pages: 64
  • Product dimensions: 7.44 (w) x 9.69 (h) x 0.13 (d)

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)