Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormal enquiry and monitor method based on target condition association rule database

A target condition and anomaly detection technology, applied in electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as high false detection rate and missed detection rate, and achieve low missed detection rate, high precision, and space-time efficiency. high effect

Inactive Publication Date: 2009-08-19
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method proposed in this paper has shortcomings in the feature vector extraction of query sentences, especially for the conditional clauses, which have a high false detection rate and missed detection rate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal enquiry and monitor method based on target condition association rule database
  • Abnormal enquiry and monitor method based on target condition association rule database
  • Abnormal enquiry and monitor method based on target condition association rule database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] For the query sentence s="SELECT attribute FROM relational table WHERE condition...", we call the part before "WHERE" the target clause or target expression, and the part after it is called the condition clause or condition expression.

[0044] Condition factor: In the condition clause, the predicate expression that meets the SQL standard syntax requirements is the condition factor, which is in the form of "expr 1 opt expr 2 ", where expr 1 And expr 2 For expressions, values, or subqueries, etc., such as attr+2, 5 * attr, 100, etc., opt is a relational predicate, such as >, <, =, LIKE, IN, etc. The condition factor is the smallest element of the condition clause.

[0045] If the condition factor is always "true" or "false", it is called a constant value condition factor. For example, for the condition factors "1=1", "2!=2" and "age=age" (age is assumed to be some Relationship attributes), obviously, they are all constant conditional factors.

[0046] For something like "SEL...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database abnormality query detecting method based on target condition relevance rules. The method comprises a rule mining method and an abnormality detecting method, wherein the rule mining method comprises an initialization phase, a frequent-item generation phase and a target condition relevance rule generation phase; the abnormality detecting method adopts a rule bank obtained in the rule mining process to carry out abnormality detection; and just when the rule existing in the rule bank meets the rule support conditions, the operation is normal, otherwise, the operation is abnormal. For the invention, the rule mining efficiency, the detection efficiency and precision are high; the detection failure and the omission factor are low; and the universality and the expansibility are high.

Description

Technical field [0001] The invention relates to a method for detecting abnormal database access operations, in particular to a method for detecting abnormal database query based on target condition association rules. Background technique [0002] With the in-depth development of information technology in various fields of society, people benefit from the tremendous opportunities brought by the information revolution, but also face the severe test of information security issues. As the storage center of important data in information systems, databases often become the most attractive targets for attackers. The traditional database security mechanism is a passive security mechanism focusing on identity authentication and access control. It has been unable to meet the growing demand for database security, especially the development of computer networking, making databases face unprecedented security dilemmas. The database should have a more active and active security mechanism to mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
Inventor 秦小麟戴华
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products