Detecting Inference Attacks using Association Rules

نویسندگان

  • Glenn Shafer
  • Sangeetha Raman
چکیده

An Inference attack occurs when a user is able to infer some information about a database without directly accessing them. Data mining techniques help to discover unknown information from a database using known information. This paper discusses how Association Rule mining can be used to detect unauthorized inferencing from the database.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semantic security against web application attacks

In this paper, we propose a method of detecting and classifying web application attacks. In contrast to current signature-based security methods, our solution is an ontology based technique. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The system is capable of detecting sophisticated attacks effectively...

متن کامل

Network Intrusion Detection Using Association Rules

Network intrusion detection includes identifying a set of malicious actions that compromise the integrity, confidentiality, and availability of information resources. The tremendous increase of novel cyber attacks has made data mining based intrusion detection techniques extremely useful in their detection. This paper describes a system that is able to detect network intrusion using association...

متن کامل

Data Level Inference Detection in Database Systems

Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the data stored in the database may help to detect more inferences. In this paper, we describe our e ort in developing a data level inference detection system. We have identi ed ve inference rules that a user can use to p...

متن کامل

Design of Host based Intrusion Detection System using Fuzzy Inference Rule

The security of a system is an important issue due to the latest advancements in information technology. Intrusion Detection Systems are used to identify the attacks and malicious activities in the computer systems. This paper discusses a new host based intrusion detection system for detecting changes in hardware profile using fuzzy inference rule. The proposed system is able to analyze and det...

متن کامل

Mining Association Rules to Evade Network Intrusion in Network Audit Data

With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001