Abnormal enquiry and monitor method based on target condition association rule database

A target condition and anomaly detection technology, applied in electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as high false detection rate and missed detection rate, achieve low missed detection rate, high space-time efficiency, regular Describe the exact effect

Inactive Publication Date: 2010-09-29
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method proposed in this paper has shortcomings in the feature vector extraction of query sentences, especially for the conditional clauses, which have a high false detection rate and missed detection rate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal enquiry and monitor method based on target condition association rule database
  • Abnormal enquiry and monitor method based on target condition association rule database
  • Abnormal enquiry and monitor method based on target condition association rule database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] For the query statement s="SELECT attribute FROM relational table WHERE condition...", we call the part before "WHERE" the target clause or the target expression, and the part after it is called the conditional clause or conditional expression.

[0043] Condition factor: In the condition clause, the predicate expression that meets the syntax requirements of the SQL standard is the condition factor, in the form of "expr 1 opt expr 2 ", where expr 1 and expr 2 is an expression, value or subquery, such as attr+2, 5*attr, 100, etc., and opt is a relational predicate, such as >, <, =, LIKE, IN, etc. A condition factor is the smallest constituent element of a condition clause.

[0044] If the condition factor is always "true" or always "false", it is called a constant value condition factor, for example, for condition factors "1=1", "2!=2" and "age=age" (age is assumed to be a certain relationship attributes), obviously, they are all constant condition factors.

[0045]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database abnormality query detecting method based on target condition relevance rules. The method comprises a rule mining method and an abnormality detecting method, wherein the rule mining method comprises an initialization phase, a frequent-item generation phase and a target condition relevance rule generation phase; the abnormality detecting method adopts a rule bank obtained in the rule mining process to carry out abnormality detection; and just when the rule existing in the rule bank meets the rule support conditions, the operation is normal, otherwise, the operation is abnormal. For the invention, the rule mining efficiency, the detection efficiency and precision are high; the detection failure and the omission factor are low; and the universality and the expansibility are high.

Description

technical field [0001] The invention relates to a method for detecting an abnormal access operation of a database, in particular to a method for monitoring an abnormal query of a database based on an association rule of an object condition. Background technique [0002] With the in-depth development of information technology in various fields of society, people are also facing the severe test of information security issues while benefiting from the huge opportunities brought by the information revolution. As the storage center of important data in information systems, databases are often the most attractive targets for attackers. The traditional database security mechanism is a passive security mechanism focusing on identity authentication and access control, which can no longer meet the growing needs of database security, especially the development of computer networking, which makes databases face an unprecedented security dilemma. The database should have a more active a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
Inventor 秦小麟戴华
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products