Dissertation > Excellent graduate degree dissertation topics show

Database security audit system based on association rules

Author: DengLei
Tutor: DengXiaoHeng;ChenZhiGang
School: Central South University
Course: Computer Science and Technology
Keywords: database audit association rules anomaly detection aprioriTid
CLC: TP311.13
Type: Master's thesis
Year: 2011
Downloads: 61
Quote: 0
Read: Download Dissertation


Database is the core and basis of information systems, which stores important information most organizations live on. The importance of protecting database security is now drawing more and more attention. At present, most information systems have taken certain safety protection measures to ensure the security of database. But these measures are far from enough to meet the needs of the database security protection. When attack happens, it is necessary to know about how the system is attacked and how to restore the database. And it is also essential to know about the specific leak existing in the system and how to obtain the evidence of the attackers. As a result, database security auditing technology emerges as required.This thesis describes the functions, models and taxonomy of database security auditing systems and briefly reviews present database security auditing technologies. Then, it points out the hidden danger existing current database security mechanism and proposes a solution by using data mining in database security auditing.This thesis utilizes data mining technology to design a new database security audit system. It constructs rule base of users’normal behaviors and judges whether users’behaviors are abnormal by comparing users’ current behaviors with normal behaviors. This thesis makes comparison among Apriori, AprioriTid and FP-Growth and finds out the most efficient one is AprioriTid. In order to be adaptive to database audit, it proposes an improved algorithm AprioriTid-OPT, which further improves the efficiency of detecting and reduces the pressure of database. In the end, this thesis achieves the basic functions of database security audit system and experimental results prove its effectiveness.

Related Dissertations

  1. Research of Anomaly Detection Algorithms of Hyperspectral Imagery Based on Kernel Method,TP751
  2. Based on data mining research tax audit case selection,F812.42
  3. The Application of Association Rules Algorithm in Higher Vocational Colleges’ Endorsement of Impoverished Students,G717
  4. Data Mining of Application in the School Management and Training Students,TP311.13
  5. An Algorithm on Clustering and Anomaly Detection for Multiple Data Streams,TP311.13
  6. Supercomputer based on log analysis method of forecasting errors,TP338
  7. Privacy -oriented association rule mining research,TP311.13
  8. Intrusion detection based on data mining technology research,TP393.08
  9. Aplastic anemia of TCM Syndrome typing literature data mining research,R259
  10. Research on the Stream Data Mining in Network Traffic Analysis,TP393.06
  11. The Application of Improved Algorithm for Association Rules Mining in Intrusion Detection,TP311.13
  12. Research on Intrusion Protective Mechanism of Database Based on User Behavior Mining,TP311.13
  13. Association Rules in the Application of University Human Resource System,TP311.13
  14. Data Mining Based on Ancient Prescriptions of Acupuncture Treatment for Mania-depressive Syndrome,R246
  15. Improving of Artificial Imune Classification and Anomaly Detection Algorithms,R392.1
  16. The Application of Data Mining Technology to Diagnose Cerebral Infarction,TP311.13
  17. Personalized Service Based on Web Data Mining,TP311.13
  18. Research on Application of Teaching Management Based on the Data Mining Technology,TP311.13
  19. Association rules algorithm and its pharmacy system in the intelligent application of,TP311.13
  20. Figure based on association rules and emotional tendencies sort of sentence,TP391.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer software > Program design,software engineering > Programming > Database theory and systems
© 2012 www.DissertationTopic.Net  Mobile