Simulation on Optimized Intrusion Detection of Multi-Layer, Distributed and Large Differences Database

Article Preview

Abstract:

Different from the traditional single databases, there is a big difference between different layers’ data of multi-level database. The differentiation of categorical attributes is small. Traditional database intrusion detection process is simply to consider the point to point data detection between the layers, without considering the similarity between the layers and ignoring the optimization for detected properties of the applied classification between the levels, resulting in lower detection accuracy. In order to avoid the above-mentioned defects of the conventional algorithm, this paper propos an intrusion detection model of multi-layered network by introducing the coarse-to-fine concept. The intrusion feature of computer database is extracted to be used as the basis for intrusion detection of database. The particle swarm distinguish tree is established to make the hierarchical processing for nodes. Through the probability operation of database intrusion detection in different layers, intrusion detection of multi-layer, distributed and large differences database can be achieved. Experimental results show that the use of the intrusion detection algorithm for multi-layer, distributed and large differences database, can increase the security of the database, ensure the safe operation of the database.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2886-2889

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chen Zhuhua, Li Xiao. A Multi-gent Particle Swarm Optimization Algorithm for Power Fault Section Estimation [J]. C omputer measurement & contorl. 2010(8): 1753-1755.

Google Scholar

[2] Su Gaoli, Deng Fangping. Introduction to Model selection of SVM Regression [J]. Bulletin of science and technolgoy, 2006, 22(2): 154-158.

Google Scholar

[3] Anjum F, Subhadrabandhu D, Sarkar S, et al. On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks. Washington: IEEE Press , 2004: 433–439.

DOI: 10.1109/broadnets.2004.52

Google Scholar

[4] Wang Xingdong, She Kun, Zhou Mingtian, et al. Intelligent IDS based on BP neural network [J]. Journal of Chengdu University of Information technology, 2005, 20(1): 1-4.

Google Scholar

[5] D. Subhadrabandhu, F. Anjum, and S. Sarkar. On optimal placement of intrusion detection modules in sensor networks[C]. Proceedings of the First International Conference on Broadband Networks, 2004: 690-699.

DOI: 10.1109/broadnets.2004.52

Google Scholar