Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/3505
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYi, J-
dc.contributor.authorLu, G-
dc.contributor.authorLü, K-
dc.coverage.spatial20en
dc.date.accessioned2009-07-21T11:56:08Z-
dc.date.available2009-07-21T11:56:08Z-
dc.date.issued2007-
dc.identifier.citationProceedings of the 2nd international conference on Scalable information systems, Suzhou, China, 2007en
dc.identifier.urihttp://bura.brunel.ac.uk/handle/2438/3505-
dc.description.abstractThe concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions to change data beyond constraints in different operations and different transactions. It happens when some appearing to be authorized and normal transactions lead to certain accumulated results out of given thresholds. The existing intrusion techniques are unable to deal with CAs. This paper proposes a detection model, Dubiety-Determining Model (DDM), for Cumulated Anomaly. This model is mainly based on statistical theories and fuzzy set theories. It measures the dubiety degree, which is presented by a real number between 0 and 1, for each database transaction, to show the likelihood of a transaction to be intrusive. The algorithms used in the DDM are introduced. A DDM-based software architecture has been designed and implemented for monitoring database transactions. The experimental results show that the DDM method is feasible and effective.en
dc.format.extent258118 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)en
dc.subjectDatabase security; Intrusion detection; Anomaly intrusionen
dc.titleA dubiety-determining based model for database cumulated anomaly intrusionen
dc.typeConference Paperen
Appears in Collections:Business and Management
Brunel Business School Research Papers

Files in This Item:
File Description SizeFormat 
6_lug.pdf252.07 kBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.