A clustering method based on data queries and its application in database intrusion detection

被引:0
|
作者
Zhong, Y [1 ]
Zhu, Z [1 ]
Qin, XL [1 ]
机构
[1] Foshan Univ, Informat & Educ Technol Ctr, Foshan 52800, Peoples R China
关键词
clustering algorithm; query similarity; intrusion detection; database security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of clustering methods assume that an attribute value of an object has a single value. However, in many fields, an attribute value for an object may be a set or a bag of values, such as the result set of a database query, which can be looked on as a set of attributes, whose values also can be a set or a bag of data. So the clustering problems of queries can be expressed as intersection problems of sets whose element also can be a set or a bag. The paper gives a method to compute similarity among queries and presents a cluster method based on it. The algorithm reads each query q in sequence, either assigning q to an existing cluster or creating q as a new cluster. At last, the application of the algorithm in database intrusion detection is shown and experiment results on synthetic and real data set are reported.
引用
收藏
页码:2096 / 2101
页数:6
相关论文
共 50 条
  • [21] Research of Intrusion Detection Method Based on Ant Colony Clustering
    Yue Qiang
    Hu Zhongyu
    Shen Shikai
    Zhang Dawei
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 6 - 11
  • [22] A clustering method based on rough sets and its application to knowledge discovery in the medical database
    Hirano, S
    Tsumoto, S
    Okuzaki, T
    Hata, Y
    MEDINFO 2001: PROCEEDINGS OF THE 10TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 2001, 84 : 206 - 210
  • [23] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [24] A wireless data clustering method for multipoint queries
    Chung, YD
    Kim, MH
    DECISION SUPPORT SYSTEMS, 2001, 30 (04) : 469 - 482
  • [25] K-Modes Clustering Algorithm Based on Weighted Overlap Distance and Its Application in Intrusion Detection
    Dai, Yawen
    Yuan, Guanghui
    Yang, Zhaoyuan
    Wang, Bin
    SCIENTIFIC PROGRAMMING, 2021, 2021
  • [26] The discretization algorithm for rough data and its application to intrusion detection
    Shi, Zhicai
    Xia, Yongxiang
    Wu, Fei
    Dai, Jian
    Journal of Networks, 2014, 9 (06) : 1380 - 1387
  • [27] Application of improved Clustering Algorithm in Intrusion Detection
    Dai Kunyu
    Hu Bin
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 621 - 624
  • [28] A Weighted Support Vector Clustering Algorithm and its Application in Network Intrusion Detection
    Sun, Sheng
    Wang, YuanZhen
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 352 - +
  • [29] Monitoring database application behavior for intrusion detection
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 383 - +
  • [30] Application of Deep Learning for Database Intrusion Detection
    Sahu, Rajesh Kumar
    Panigrahi, Suvasini
    ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 501 - 511