Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Detection of Database Intrusion Using a Two-Stage Fuzzy System

Identifieur interne : 001339 ( Main/Exploration ); précédent : 001338; suivant : 001340

Detection of Database Intrusion Using a Two-Stage Fuzzy System

Auteurs : Suvasini Panigrahi [Inde] ; Shamik Sural [Inde]

Source :

RBID : ISTEX:33F4518489215179FBC208BE044267F9C6A31342

Abstract

Abstract: This paper presents a novel approach for detecting intrusions in databases based on fuzzy logic, which combines evidences from user’s current as well as past behavior. A first-order Sugeno fuzzy model is used to compute an initial belief for each transaction. Whether the current transaction is genuine, suspicious or intrusive is first decided based on this belief. If a transaction is found to be suspicious, its posterior belief is computed using the previous suspicion score and the fuzzy evidences obtained from the history databases by applying fuzzy-Bayesian inferencing. Final decision is made about a transaction according to its current suspicion score. Evaluation of the proposed method clearly shows that the application of fuzzy logic significantly reduces the number of false alarms, which is one of the core problems of existing database intrusion detection systems.

Url:
DOI: 10.1007/978-3-642-04474-8_9


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Detection of Database Intrusion Using a Two-Stage Fuzzy System</title>
<author>
<name sortKey="Panigrahi, Suvasini" sort="Panigrahi, Suvasini" uniqKey="Panigrahi S" first="Suvasini" last="Panigrahi">Suvasini Panigrahi</name>
</author>
<author>
<name sortKey="Sural, Shamik" sort="Sural, Shamik" uniqKey="Sural S" first="Shamik" last="Sural">Shamik Sural</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:33F4518489215179FBC208BE044267F9C6A31342</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-04474-8_9</idno>
<idno type="url">https://api.istex.fr/document/33F4518489215179FBC208BE044267F9C6A31342/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000F54</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000F54</idno>
<idno type="wicri:Area/Istex/Curation">000F54</idno>
<idno type="wicri:Area/Istex/Checkpoint">000A89</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000A89</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Panigrahi S:detection:of:database</idno>
<idno type="wicri:Area/Main/Merge">001343</idno>
<idno type="wicri:Area/Main/Curation">001339</idno>
<idno type="wicri:Area/Main/Exploration">001339</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Detection of Database Intrusion Using a Two-Stage Fuzzy System</title>
<author>
<name sortKey="Panigrahi, Suvasini" sort="Panigrahi, Suvasini" uniqKey="Panigrahi S" first="Suvasini" last="Panigrahi">Suvasini Panigrahi</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Inde</country>
<wicri:regionArea>School of Information Technology, Indian Institute of Technology, Kharagpur</wicri:regionArea>
<wicri:noRegion>Kharagpur</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Inde</country>
</affiliation>
</author>
<author>
<name sortKey="Sural, Shamik" sort="Sural, Shamik" uniqKey="Sural S" first="Shamik" last="Sural">Shamik Sural</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Inde</country>
<wicri:regionArea>School of Information Technology, Indian Institute of Technology, Kharagpur</wicri:regionArea>
<wicri:noRegion>Kharagpur</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Inde</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">33F4518489215179FBC208BE044267F9C6A31342</idno>
<idno type="DOI">10.1007/978-3-642-04474-8_9</idno>
<idno type="ChapterID">9</idno>
<idno type="ChapterID">Chap9</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper presents a novel approach for detecting intrusions in databases based on fuzzy logic, which combines evidences from user’s current as well as past behavior. A first-order Sugeno fuzzy model is used to compute an initial belief for each transaction. Whether the current transaction is genuine, suspicious or intrusive is first decided based on this belief. If a transaction is found to be suspicious, its posterior belief is computed using the previous suspicion score and the fuzzy evidences obtained from the history databases by applying fuzzy-Bayesian inferencing. Final decision is made about a transaction according to its current suspicion score. Evaluation of the proposed method clearly shows that the application of fuzzy logic significantly reduces the number of false alarms, which is one of the core problems of existing database intrusion detection systems.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Inde</li>
</country>
</list>
<tree>
<country name="Inde">
<noRegion>
<name sortKey="Panigrahi, Suvasini" sort="Panigrahi, Suvasini" uniqKey="Panigrahi S" first="Suvasini" last="Panigrahi">Suvasini Panigrahi</name>
</noRegion>
<name sortKey="Panigrahi, Suvasini" sort="Panigrahi, Suvasini" uniqKey="Panigrahi S" first="Suvasini" last="Panigrahi">Suvasini Panigrahi</name>
<name sortKey="Sural, Shamik" sort="Sural, Shamik" uniqKey="Sural S" first="Shamik" last="Sural">Shamik Sural</name>
<name sortKey="Sural, Shamik" sort="Sural, Shamik" uniqKey="Sural S" first="Shamik" last="Sural">Shamik Sural</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001339 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001339 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:33F4518489215179FBC208BE044267F9C6A31342
   |texte=   Detection of Database Intrusion Using a Two-Stage Fuzzy System
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024