A clustering method based on data queries and its application in database intrusion detection

被引:0
|
作者
Zhong, Y [1 ]
Zhu, Z [1 ]
Qin, XL [1 ]
机构
[1] Foshan Univ, Informat & Educ Technol Ctr, Foshan 52800, Peoples R China
关键词
clustering algorithm; query similarity; intrusion detection; database security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of clustering methods assume that an attribute value of an object has a single value. However, in many fields, an attribute value for an object may be a set or a bag of values, such as the result set of a database query, which can be looked on as a set of attributes, whose values also can be a set or a bag of data. So the clustering problems of queries can be expressed as intersection problems of sets whose element also can be a set or a bag. The paper gives a method to compute similarity among queries and presents a cluster method based on it. The algorithm reads each query q in sequence, either assigning q to an existing cluster or creating q as a new cluster. At last, the application of the algorithm in database intrusion detection is shown and experiment results on synthetic and real data set are reported.
引用
收藏
页码:2096 / 2101
页数:6
相关论文
共 50 条
  • [1] An Intrusion Detection Method Based on Damped Window of Data Stream Clustering
    Li, Shengnan
    Zhou, Xiaofeng
    2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 1, 2017, : 211 - 214
  • [2] Intrusion detection based on clustering a data stream
    Oh, SH
    Kang, JS
    Byun, YC
    Park, GL
    Byun, SY
    Third ACIS International Conference on Software Engineering Research, Managment and Applications, Proceedings, 2005, : 220 - 227
  • [3] Application of Clustering Algorithm in Intrusion Detection Based on PCA
    Li, Han
    2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 239 - 244
  • [4] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [5] Improved fuzzy clustering algorithm and its application to intrusion detection
    Chen, Jianmei
    Song, Shunlin
    Lu, Hu
    Song, Yuqing
    Zhu, Yuquan
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2007, 37 (04): : 589 - 592
  • [6] An Intrusion Detection mechanism based on feature based data clustering
    Das, Debasish
    Sharma, Utpal
    Bhattacharyya, D. K.
    2008 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2008, : 172 - 175
  • [7] CID: a novel clustering-based database intrusion detection algorithm
    Keyvanpour, Mohamad Reza
    Barani Shirzad, Mehrnoush
    Mehmandoost, Samaneh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 1601 - 1612
  • [8] Enhanced swarm intelligence clustering algorithm based on RBFNN and its application in intrusion detection
    College of Computer Science, Chongqing University, Chongqing 400030, China
    J. Comput. Inf. Syst., 2008, 1 (251-256):
  • [9] CID: a novel clustering-based database intrusion detection algorithm
    Mohamad Reza Keyvanpour
    Mehrnoush Barani Shirzad
    Samaneh Mehmandoost
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1601 - 1612
  • [10] An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application
    Xie, Xin
    Jiang, Xunyi
    Wang, Weiru
    Wang, Bin
    Wan, Tiancheng
    Yang, Hao
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 13 - 20