(3.237.20.246) 您好!臺灣時間:2021/04/15 09:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:謝正嘉
研究生(外文):Cheng-Chia Hsieh
論文名稱:應用FuzzyART與啟發式規則偵測資料庫異常連線
論文名稱(外文):The anomaly intrusion detection on database connections using Fuzzy ART neural network and rule heuristics
指導教授:陳榮靜陳榮靜引用關係
指導教授(外文):Rung-Ching Chen
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:85
中文關鍵詞:資料庫類神經網路啟發式規則異常分析
外文關鍵詞:rule heuristicsdatabaseFuzzy ARTanomalyneural network
相關次數:
  • 被引用被引用:1
  • 點閱點閱:217
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:44
  • 收藏至我的研究室書目清單書目收藏:0
在二十一世紀的今日,電腦作業己成為企業日常作業不可或缺的一環,而隨著電腦作業便利及效率伴隨而來的則是各式各樣的駭客攻擊、後門程式所帶來的機密外洩、內部使用人員非法使用電腦系統等資訊安全問題,嚴重的影響到企業資訊及系統的安全,而資訊委外及網際網路的興起則對企業資訊安全添加更大的風險因素。
資訊委外為目前企業資訊熱門應用方式之一,其目的為節省公司資訊作業的支出及獲得專業資訊服務公司所帶來的資訊應用技術,以期為公司帶來最大利益。惟資訊委外除了帶來成本降低、先進的資訊應用技術外,也同時帶來資訊安全問題,除使用合約規範資訊合作廠商行為及第三公正單位來監督廠商行為外,若企業具有一套簡易有效的防護措施,用來保護企業資訊資產,相信對企業資訊安全有著更大的保障。
網際網路的興起,使得企業資訊應用層面更加多元化,資訊系統使用習慣改變,增加資訊系統的便利性。網際網路帶來的改變除了應用層面及使用習慣外,更加上資訊系統由以往封閉性系統走上開放性系統的改變,由以往公司內部封閉性系統改為網際網路式的開放架構,使用者可於任何地點進入企業資訊系統,也使駭客可連接到企業資訊系統,增加企業資訊系統的遭人入侵的風險性。
因為資料庫為企業存放資訊的重要設備,保護資料庫為企業資訊安全的首要目標;本研究提出利用類神經網路:Fuzzy ART及啟發式規則為基礎的偵測資料庫異常連線模型,讓資料庫管理人員以查核及阻絶資料庫異常連線做為保護資料庫的方法,在現實環境中找到一個可行的保護策略,以協助企業達到保護資訊的目的。
The information processing has become the basic operations of the corporation in the 21th century. Due to convenience of computer processing, many problems arises : the hacker attacks information system, backdoor threats the enterprise security, and insider misuses computer system. Because the inside problem about outsourcing and Internet, the corporation faces the serious challenge.
Outsourcing is a popular method for developing enterprise’s information system. The main object of outsourcing is to reduce the cost of information system and to get the new technology from the professional information company, but the risk of system outsourcing is high. For reducing the risk of outsourcing, one way is to subscribe the exact contract with the outsourcing company; the other way is to commend the third-party experts to monitor the action of outsourcing company. The security of information system will be enhanced if some effectively protecting ways are used.
Due to the rising and flourishing of the Internet, the computer applications in corporation are more aplenty and convenient than early year. The behaviors of using information system are changed by the Internet. For example, the information system of corporation is changed from closed system to opened system. The information systems are covered through the Internet. Therefore, users could access the information system from anywhere. By the same way, and attacker can login and threat the information system of enterprise.
Database is the most important component among the elements that consist of enterprise’s information system. Protecting the database is critical to the security of information system. This thesis proposes a novel method to protect database from unauthorized access. Using Fuzzy ART and rule heuristics to analyze the connection records, the administrator can decide whether a connection is abnormally or normally. This is a probable method to protect corporation security information in the real world.
目 錄
摘要................................................Ⅰ
Abstract............................................Ⅲ
目 錄...............................................Ⅴ
表 目 錄............................................Ⅷ
圖 目 錄............................................Ⅸ
第一章 導論.........................................1
1.1 研究動機.........................................1
1.2 研究目的.........................................3
1.3 研究範圍與限制...................................5
1.4 論文架構.........................................5
第二章 文獻探討....................................6
2.1 分支機構的管理問題...............................6
2.2 資訊系統委外的發展...............................7
2.3 資訊安全問題討論................................15
2.3.1 入侵偵測系統依技術分類........................15
2.3.2 入侵偵測系統偵測方法..........................16
2.3.3 以入侵者分類..................................22
2.4 資料庫監控......................................24
2.5 類神經網路及自適應共振理論網路..................28
2.5.1 定義..........................................28
2.5.2 類神經網路學習策略............................31
2.5.3 類神經網路模式選擇............................33
2.5.4 自適應共振理論網路............................35
2.6 啟發式規則......................................37
2.6.1 定義..........................................37
2.6.2 規則的表示方式................................38
2.6.3 架構..........................................38
第三章 研究方法及架構.............................42
3.1 研究目標........................................42
3.2 研究方法........................................43
3.2.1 ART特點.......................................43
3.2.2 ART網路架構...................................44
3.2.3 ART演算法.....................................48
3.2.4 Fuzzy ART 與 ART不同..........................51
3.3 研究架構模型....................................53
第四章 實驗.......................................56
4.1 實驗背景描述....................................56
4.2 實驗內容描述....................................56
4.3 實驗 ...........................................63
第五章 結論與未來研究.............................76
參考文獻............................................78
[1]Andrew Conry-Murray(2005),「來算內部的安全威脅」,網路資訊,2005年第11期,第50-58頁
[2]David Greenfield、「網路安全委外處理省麻煩」,網路資訊,2001年第9期,第132-138頁
[3]Penny Lunt Crosman、「網路管理委外風潮吹不停」,網路資訊、2005年第5期,第115-121頁
[4]王旭正主編(2002), 資通安全專輯之四系統安全, 行政院國家科學委員會科學技術資料中心。
[5]王岳忠,「全力偵測機而動的新威脅」,網路通訊,2003年第4期,第64-67頁
[6]江孟峰編著(2002), 專家系統, 文魁資訊有限公司。
[7]行政院主計處,「各機關資訊作業委外服務實施(計費)要點【停止適用】」,民國88年停止適用。
[8]行政院主計處,機關委託資訊服務廠商評選及計費辦法」,http://www.dgbas.gov.tw,民國88年。
[9]行政院主計處電子處理資料中心 ,「91年電腦應用概況報告」,http://www.dgbas.gov.tw,行政院主計處電子處理資料中心,民國92年。
[10]行政院主計處電子處理資料中心 ,「92年電腦應用概況報告」,http://www.dgbas.gov.tw,行政院主計處電子處理資料中心,民國93年。
[11]行政院主計處電子處理資料中心 ,「93年電腦應用概況報告」,http://www.dgbas.gov.tw,行政院主計處電子處理資料中心,民國94年。
[12]吳萬順總編(2005), 地政業務電化紀實, 內政部。
[13]曹祥彬(2002),建構快速資料庫查詢語言截取架構與實施,逢甲大學資訊工程學系,臺中。
[14]葉怡成(2002), 類神經網路模式應用與實作, 儒林圖書有限公司。
[15]
[16]蔡甘子、「委外服務與資安管理」、網路通訊、2005年第4期、第17-22頁
[17]鄭義熙(2001),政府資訊作業系統委外管理之研究-以國稅局資訊系統為例,義守大學,高雄。
[18]賴妍帆、「網路、安全、弱點與風險管理」,網路通訊,2003年第3期,第44-46頁
英文文獻
[19]D. Clarkjr. Thomas, W. Zmud Robert, E. McCray Gordon (1995), “The Outsourcing of Information Services: Transforming the Nature of Business in the Information Industry,” Journal of Information Technology(Routledge, Ltd.), DEC, Vol. 10, Issue 4, pp 221-237.
[20]D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii(2005), “CIDS: An agent-based intrusion detection system,” Computers & Security, Vol. 24, pp 387-398.
[21]D. L. Carter & A.J. Katz.(1996) "Trends and experiences in computer-related crime: Findings from a national study,” The Annual Meeting of the Academy of Criminal Justice Sciences, Las Vegas, NV.
[22]Daniel J. Burroughs, Linda F. Wilson and George V. Cybenko(2002), “Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods,” 21st IEEE International Performance, Computing, and Communications Conference, pp. 329-334.
[23]Dipankar Dasgupta and Fabio Gonzalez(2002), “An Immunity-Based Technique to Characterize Intrusions in Computer Networks,” IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, pp. 281-291.
[24]Dit-Yan Yeung, Yuxin Ding(2003), “Host-based intrusion detection using dynamic and static behavioral models,” Pattern Recognitions, Vol. 36, pp. 229-243.
[25]Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood,(2005), “Training genetic programming on half a million patterns: an example from anomaly detection,” IEEE Transactions on Evolutionary Computation, Vol. 9, Issue. 3, pp. 225-239.
[26]E. Eugene Schultz(2002), “A framework for understanding and predicting insider attacks,” Computer & Security, Vol. 21, No. 7,pp. 526-531.
[27]Erland Jonsson and Tomas Olovsson(1997), “A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior,” IEEE Transactions on Software Engineering, Vol. 23, No. 4, pp. 235-245.
[28]G. B. Magklaras and S.M. Funell(2002), “Insider Threat Prediction Tool: Evaluating the Probability of IT misuse,” Computers & Security, Vol. 21, No. 1, pp. 62-73.
[29]Gail A. Carpenter and Stephen Grossberg(1988), “The ART of adaptive pattern recognition by a self-organizing neural network,” IEEE Computer, Vol. 21, Issue. 3, pp. 77-88.
[30]Gail A. Carpenter, Stephen Grossberg and David B. Rosen(1991), “ART 2-A: an adaptive resonance algorithm for rapid category learning and recognition,” International Joint Conference on Neural Networks, Vol. 2, pp. 151-156.
[31]Gail A. Carpenter, Stephen Grossberg and David B. Rosen(1991), “Fuzzy ART: an adaptive resonance algorithm for rapid, stable classification of analog patterns,” International Joint Conference on Neural Networks, Vol. 2, pp. 411-416.
[32]Gail A. Carpenter, Stephen Grossberg and David B. Rosen(1991), “Fuzzy ART: Fast Stable Learning and Categorization of Analog Patterns by an Adaptive Resonance System,” Neural Networks, Vol. 4, pp 759-771.
[33]Giacinto Giorgio and Rol Fabio(2002), “Intrusion Detection in Computer Networks by Multiple Classifier Systems,” IEEE Proceedings. 16the International Conference on Pattern Recognition, Vol. 2, pp. 390-393.
[34]H. Allend William and A. Marin Gerald(2003), “On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems,” Proceedings of the Symposium on Applications and the Internet (SAINT’03), pp. 242-248
[35]James P. Anderson(1980), “Computer Security Threat Monitoring and Surveillance,” Technical report, Fort Washington, Pennsylvania, April.
[36]Jiong Zhang and Mohanmmad Zulkernine(2006), “A Hybrid Network Intrusion Detection Technique Using Random Forests,” The First International Conference on Availability, Reliablity and Security. pp. 262-269.
[37]Joseph S. Sherif, Tommy G. Dearmond, “Intrusion Detections: Systems and Models,” Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE’02), pp. 1-19
[38]Klepper Robert & Wendell O. Jones(1997), Outsourcing Information Technology, Systems & Services, Prentice Hall; 1st edition.
[39]Leon A. Delooff(1995), “Information systems outsourcing decision making: a framework, organizational theories and case studies,” Journal of Information Technology (Routledge, Ltd.), Dec, Vol. 10, Issue. 4, pp. 281-297.
[40]M. Apte Uday and G. Sobol Marion, Tatsumi Shimada and Timo Saarinen, Timo SAlmela and Ari P. J. Vepsalainen(1997), “IS outsourcing practices in the USA, Japan and Finland: a comparative study,” Journal of Information Technology (Routledge, Ltd.), Dec, Vol. 12, Issue. 4, pp. 289-304.
[41]McHugh John, Christie Alan, and Allen Julia (2000), “Defending Yourself: The Role of Intrusion Detection Systems,” IEEE Software, Vol. 17,pp. 42-51.
[42]Negnevitsky Michael(2002), Artificial Intelligence A guide to Intelligent Systems, Addison Wesley; 1st edition.
[43]Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, and Mingming Xu(2001), “Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data,” IEEE Transactions on Systems, Man, and Cybernetics-PART A: Systems and Humans, Vol. 31, No. 4, pp. 266-274.
[44]Ozgur Depren, Murat Topallar, Emin Anarim, M. Kemall Ciliz(2005), “An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks,” Expert Systems with Applications, Vol. 29, Issue 4, pp. 713-722.
[45]Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont(2002), “An Artificial Immune System Architecture for Computer Security Applications,” IEEE Transacations on Evolutionary Computation, Vol. 6, No. 3, pp. 252-280.
[46]Peter Lichodzijewski, A. Nur Zincir-Heywood, Malcolm I. Heywood(2002), “Host-Based Intrusion Detection Using Self-Organizing Maps,” Proceedings of the International Joint Conference on Neural Network, Vol. 2, pp. 1714-1719.
[47]R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni(2001), “A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors,” IEEE Symposium on Security and Privacy, pp. 144-155.
[48]Robert Graham,FAQ:Network Intrusion Detection System, version 0.8.3, March 21,2000, http://www.robertgraham.com/ pubs/network-intrusion-detection.html.
[49]S. Jha, M. Hassan(2002), “Building agents for rule-based intrusion detection system,” Computer Communications, Vol. 25, pp. 1366-1373.
[50]Shiuh-Pyng Shieh and Virgil D. Gligor(1997), “On a Pattern-Oriented Model for Intrusion Detection,” IEEE Transactions on Knowledge and Data Engineering, Vol. 9, No. 4, pp. 661-667.
[51]Susan C. Lee and David V. Heinbuch(2001), “Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks,” IEEE Transactions on systems, man, and cybernetics PART A: Systems and Humans, Vol. 31, No. 4, pp. 294-299.
[52]Tan Lin, Timothy Scherwood(2006), “Architectures for Bit-Split String Scanning in Intrusion Detection,” IEEE Micro, Vol. 26, Issue 1, pp. 110-117.
[53]Wenhui Shu(2001), “A Novel Intrusion Detection System Model for Securing Web-based Database Systems,” COMPSAC 25th Annual International Computer Software and Applications Conference. pp. 249-254.
[54]Wu Yang, Xiao-Chung Yun, Le-Jun Zhang(2005), “Using Incremental Learning Method for Adaptive Network Intrusion Detection,” Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vol. 7, pp. 3932-3936.
[55]Xiang-Rong Yang, Jun-Yi Shen, Rui Wang(2002), “Artificial Immune Theory Based Network Intruision Detection System and the Algorithms Design,” Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing, pp. 73-77.
[56]Yoshnori Okazaki, Izuru Sato(2002), “A New Intrusion Detection Method based on Process Profiling,” Proceedings of the 2002 Symposium on Applications and the Internet (SAINT’02), pp. 82-90.
[57]Xiang-Rong Yang, Jun-Yi Shen, Rui Wang(2002), “Artificial Immune Theory Based Network Intruision Detection System and the Algorithms Design,” Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing, pp. 73-77.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔