Investigative Data Warehousing and Mining for Database Security

作者: Donald Berndt , Areej Yassin , Monica Chiarini

DOI:

关键词:

摘要: In this study a preliminary investigative data warehouse is developed to integrate and store very detailed audit from multiple sources support comprehensive view of database usage potential security breaches. The was populated with real collected over year use by students in variety classes. This extracted seeded some unusual patterns that represent intrusions into systems or misuse insiders. A pivot table interface shown as an example human-in-the-loop navigation tool for investigating activity at level. Market basket analysis explored mining technique uncovering rare patterns. resulting rules identified most the demonstrating such automated techniques detecting malicious unauthorized activities.

参考文章(25)
Philip K. Chan, Matthew V. Mahoney, Muhammad H. Arshad, Learning Rules and Clusters for Anomaly Detection in Network Traffic Springer, Boston, MA. pp. 81- 99 ,(2005) , 10.1007/0-387-24230-9_3
Robert Tibshirani, Trevor Hastie, Jerome H. Friedman, The Elements of Statistical Learning ,(2001)
Louis W. Glorfeld, Hilol Bala, Robert Miller, Classifying Network Intrusions: A Comparison of Data Mining Methods. americas conference on information systems. pp. 117- ,(2005)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Alexandr Seleznyov, Seppo Puuronen, Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. recent advances in intrusion detection. ,(1999)
Rosa Meo, Marco Botta, Roberto Esposito, Arianna Gallo, A novel incremental approach to association rules mining in inductive databases Lecture Notes in Computer Science. ,vol. 3848, pp. 267- 294 ,(2004) , 10.1007/11615576_13
Heikki Mannila, A. Inkeri Verkamo, Ramakrishnan Srikant, Hannu Toivonen, Rakesh Agrawal, Fast discovery of association rules knowledge discovery and data mining. pp. 307- 328 ,(1996)
James Franklin, The elements of statistical learning : data mining, inference,and prediction The Mathematical Intelligencer. ,vol. 27, pp. 83- 85 ,(2005) , 10.1007/BF02985802
Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li, Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining siam international conference on data mining. pp. 103- 114 ,(2005) , 10.1137/1.9781611972757.10
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496