首页 | 本学科首页   官方微博 | 高级检索  
     

基于离散马尔科夫链的数据库用户异常行为检测
引用本文:毕猛,王安迪,徐剑,周福才.基于离散马尔科夫链的数据库用户异常行为检测[J].沈阳工业大学学报,2018,40(1):70-76.
作者姓名:毕猛  王安迪  徐剑  周福才
作者单位:1. 东北大学 软件学院, 沈阳 110169; 2. 沈阳工业大学 管理学院, 沈阳 110870; 3. 中国科学院信息工程研究所 信息安全国家重点实验室, 北京 100093
基金项目:国家自然科学基金资助项目(61602102,61402095);辽宁省科技攻关计划项目(2013217004);中央高校基本科研业务费专项基金资助项目(N151704002);沈阳市科技计划资助项目(F14-231-1-08)
摘    要:针对数据库系统内部攻击的问题,将基于用户行为的异常检测方法引入到数据库系统内部攻击检测中.将离散时间马尔科夫链(DTMC)应用到数据库系统异常检测中,构建了一种基于DTM C的用户行为异常检测系统.将用户提交的SQL语句作为用户行为特征进行分析,并利用DTM C分别提取了正常用户和待检测行为的行为特征,并将两者进行比较,如果两者的偏离程度超过了阈值,则判定行为异常.通过实验对所提出系统的可行性和有效性进行测试,结果表明,该系统可以较好地描述用户行为,并有效地检测出数据库系统内部攻击.

关 键 词:网络安全  数据库安全  用户行为  内部攻击  异常检测  入侵检测  SQL语句  离散马尔科夫链  

Anomaly behavior detection of database user based on discrete-time Markov chain
BI Meng,WANG An-di,XU Jian,ZHOU Fu-cai.Anomaly behavior detection of database user based on discrete-time Markov chain[J].Journal of Shenyang University of Technology,2018,40(1):70-76.
Authors:BI Meng  WANG An-di  XU Jian  ZHOU Fu-cai
Affiliation:1. Software College, Northeastern University, Shenyang 110169, China; 2. School of Management, Shenyang University of Technology, Shenyang 110870, China; 3. State Key Laboratory of Information Security, Institute of Information Engineering of Chinese Academy of Sciences, Beijing 100093, China
Abstract:Aiming at the problem of internal attack in the database system, an anomaly detection method based on the user behaviour was introduced into the internal attack detection in the database system. The discrete-time Markov chain(DTMC)was applied to the anomaly detection of database system, and an anomaly detection system for user behaviour based on DTMC was established. The SQL statements submitted by the users were taken as the user behavior features and were analyzed. In addition, the behavior features of normal users and behavior to be detected were extracted with DTMC, and the corresponding comparison between them was performed. If the deviation degree of two behavior features was beyond the threshold, the detected behavior would be judged as an anomaly behavior. The feasibility and effectiveness of the proposed system were actually tested. The results show that the proposed system can better describe the user behavior, and can effectively detect the internal attack of database system.
Keywords:network security  database security  user behavior  internal attack  anomaly detection  intrusion detection  SQL statement  discrete-time Markov chain(DTMC)  
本文献已被 CNKI 等数据库收录!
点击此处可从《沈阳工业大学学报》浏览原始摘要信息
点击此处可从《沈阳工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号