Detection of database intrusion using a two-stage fuzzy system

6Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents a novel approach for detecting intrusions in databases based on fuzzy logic, which combines evidences from user's current as well as past behavior. A first-order Sugeno fuzzy model is used to compute an initial belief for each transaction. Whether the current transaction is genuine, suspicious or intrusive is first decided based on this belief. If a transaction is found to be suspicious, its posterior belief is computed using the previous suspicion score and the fuzzy evidences obtained from the history databases by applying fuzzy-Bayesian inferencing. Final decision is made about a transaction according to its current suspicion score. Evaluation of the proposed method clearly shows that the application of fuzzy logic significantly reduces the number of false alarms, which is one of the core problems of existing database intrusion detection systems. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Panigrahi, S., & Sural, S. (2009). Detection of database intrusion using a two-stage fuzzy system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5735 LNCS, pp. 107–120). https://doi.org/10.1007/978-3-642-04474-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free