Detecting Inference Attacks using Association Rules
نویسندگان
چکیده
An Inference attack occurs when a user is able to infer some information about a database without directly accessing them. Data mining techniques help to discover unknown information from a database using known information. This paper discusses how Association Rule mining can be used to detect unauthorized inferencing from the database.
منابع مشابه
Semantic security against web application attacks
In this paper, we propose a method of detecting and classifying web application attacks. In contrast to current signature-based security methods, our solution is an ontology based technique. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The system is capable of detecting sophisticated attacks effectively...
متن کاملNetwork Intrusion Detection Using Association Rules
Network intrusion detection includes identifying a set of malicious actions that compromise the integrity, confidentiality, and availability of information resources. The tremendous increase of novel cyber attacks has made data mining based intrusion detection techniques extremely useful in their detection. This paper describes a system that is able to detect network intrusion using association...
متن کاملData Level Inference Detection in Database Systems
Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the data stored in the database may help to detect more inferences. In this paper, we describe our e ort in developing a data level inference detection system. We have identi ed ve inference rules that a user can use to p...
متن کاملDesign of Host based Intrusion Detection System using Fuzzy Inference Rule
The security of a system is an important issue due to the latest advancements in information technology. Intrusion Detection Systems are used to identify the attacks and malicious activities in the computer systems. This paper discusses a new host based intrusion detection system for detecting changes in hardware profile using fuzzy inference rule. The proposed system is able to analyze and det...
متن کاملMining Association Rules to Evade Network Intrusion in Network Audit Data
With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001