Journal of Applied Sciences ›› 2005, Vol. 23 ›› Issue (5): 506-512.

• Articles • Previous Articles     Next Articles

Mining Algorithm Based on User Query and Its Application in Intrusion Detection

ZHONG Yong, QIN Xiao-lin, BAO Lei   

  1. Institute of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
  • Received:2004-06-03 Revised:2004-10-08 Online:2005-09-30 Published:2005-09-30

Abstract: As traditional user identification and access control of database security mechanism have limitations such as inability of resisting illegal SQL injection and abuse of authorization, a transaction-level user query profiles mining algorithm is presented by using characteristics of structure stabilization of user queries and attributes.The method can be used for database intrusion detection to effectively prevent these illegal actions. Implementation, complexity and application of the algorithm are discussed, and influence of the algorithm on the database query analyzed.

Key words: intrusion detection, database security, data mining

CLC Number: