An intrusion detection method for a database

An intrusion detection and database technology, applied in the field of network security, can solve problems such as complex detection algorithms, low detection efficiency, and low detection efficiency, so as to reduce missed detection rate and false detection rate, improve data mining speed, and improve self-adaptation The effect of poor performance and detection efficiency

Inactive Publication Date: 2019-06-18
安徽云探索网络科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The object of the present invention is to provide a kind of intrusion detection method that is used for database, solves the problem that existing detection algorithm is complicated, detection efficiency is low by improving association rule mining algorithm; Mining to form a knowledge base; solving the problems of poor adaptability and low detection efficiency of existing detection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0019] The invention is an intrusion detection method for a database, comprising the following steps:

[0020] Step 1: Improve association rule mining algorithm; optimize and improve based on Apriori algorithm; including:

[0021] (1) Reduce the number of candidates in the item candidate set; by cutting the frequent item sets before the candidate item set is produced, count the number of occurrences of each item in the frequent item set, and delete the item sets whose occurrence times in the frequent item set are less than the frequent i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method for a database, and relates to the technical field of network security. The method comprises the steps of 1, improving an association rule miningalgorithm; 2, performing data acquisition and preprocessing; Step 3, establishing an intrusion detection rule base; and step 4, performing intrusion detection. By improving the association rule miningalgorithm, the problems that an existing detection algorithm is complex and low in detection efficiency are solved; The detected intrusion behavior is mined by using an improved association rule mining algorithm to form a knowledge base; The problems that an existing detection method is poor in adaptability and low in detection efficiency are solved.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an intrusion detection method used for databases. Background technique [0002] With the continuous development of the network, network security is becoming more and more serious; the existing database security is also one of the main objects of information security research; the existing database security detection mostly uses data mining methods, such as the association mining algorithm Apriori; but the existing There are flaws in the data detection algorithm, which requires multiple scans of the database to generate a large number of candidate item sets, which is complex and affects the detection efficiency; at the same time, with the continuous change of intrusion types, the existing detection rules cannot detect abnormal operations in time. Poor adaptability and low detection rate. Contents of the invention [0003] The object of the present invention is to provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
Inventor 葛军黄土平
Owner 安徽云探索网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products