• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    2021-12-15 12:48:18YouseefAlotaibi
    Computers Materials&Continua 2021年2期

    Youseef Alotaibi

    Department of Computer Science, College of Computer and Information Systems, Umm Al Qura University, Makkah, 21421,Saudi Arabia

    Abstract:A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles.Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier, where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.

    Keywords: Adaptive search memory; clustering; database management system(DBMS); intrusion detection system (IDS); quiplets; structured query language(SQL);tube search

    1 Introduction

    Data can be considered a significant asset for all modern organizations,which may store a huge amount in their databases and cloud.Database management systems(DBMSs)are used by organizations to control access to these data by both internal and external users.Access must be protected,especially from competitors,and thus security and privacy are considered key issues for organizations to protect their data[1].

    The literature describes many threats to databases from both internal and external users.External users can access databases using web applications or computer networks [2].In addition, the literature reveals various techniques that can be used to protect computer networks from external threats, such as fire-wall systems and detection models at the network layer.However, external users may still have access to these database resources.They can also use web applications to execute queries on back-end databases, and can hack network systems.Therefore, network security systems have recently used intrusion detection(ID) techniques to protect network resources against irregular behavior [3].Network intrusion detection systems (IDS) can be considered an open research area because detecting misuse of databases by legitimate users is not possible using IDS.Hence,databases are still vulnerable to internal threats.

    As internal users are allowed to bypass fire-wall systems and network security,as such internal threats can be considered more difficult to detect than external threats.Internal users can login to the system and gain access to non-authorized resources [4].These threats, which cannot be handled using network intrusion systems, mostly aim to affect Structured Query Language (SQL) commands for database systems, or trigger transactions to access non-privileged resources.

    Traditional DBMS assign resources to users to control access to database resources.However, they cannot handle user queries or SQL injections that can be defined as an attack in which malicious code is added to strings passed to the SQL server for execution [5].Inserting code directly into user input variables, which can be concatenated with SQL executions and commands, can be considered a key form of SQL injection.

    SQL injections can be considered a key dangerous issue for database systems as legitimate users are able to apply them.Further, DBMS cannot guarantee data privacy and security against these threats; thus a traditional DBMS architecture must be developed to adapt to new threats and ensure high data privacy and security for organizations [6].

    IDS can be considered one of the most important parts of any well-secured system as they can detect malicious actions.They can be used to protect network resources and distinguish between malicious and legitimate transactions [7].They can be considered the most satiable solution for SQL injections and detecting internal threats as they can analyze queries before executing them.They can inform responsible persons in the database system, such as the site security officer (SSO) or database administrator (DBA),who then handle such threats.Moreover, they can trigger actions to handle intrusions[8].

    The literature suggests that building profiles for representing users’normal access behavior is the main way to detect malicious transactions[9].User profiles can be used to describe normal behavior and users who deviate from this behavior are known as intruders.Therefore, clustering algorithms are needed to build profiles and group together users who demonstrate similar interaction behavior.Further, machine learning algorithms can be used to implement the ID task to classify issued user transactions against related user profiles.For higher security and better protection against internal threats, IDS must be added to the DBMS[10].

    Only one profile for each role needs to be built,to minimize the number of profiles;the role represents all users who have similar database access behavior.This can help the IDS to easily control and maintain profiles for organizations with large numbers of users.

    We can classify organizations into two types when creating an IDS for them:(1)Organizations with rolebased access control where one or more roles are assigned for each user; and (2) Organizations without detailed role architecture assigned for each user [11].

    In the first type, the role can be considered a package of authorizations for database resources where there is a clear role hierarchy assigned to each user.In this case, a machine learning algorithm is used to permit or deny non-authorized resource use via issued queries, by comparing queries against user-related roles and identifying them as malicious transactions or otherwise.

    In the second type,the application’s authorizations can be used by organizations as the role for each user.In this case, clustering algorithms in the database log file can be used to cluster users who have similar interaction behavior in such a profile.Intrusion-free log files,where users’normal behavior guarantees zero intrusions,can be used and then profiles can be used for each user as the role to detect anomalous behavior.Every user has to be mapped into one profile.Finally,similar to the first type,machine learning algorithms can be used to detect malicious transactions.

    The literature shows that most existing algorithms have several drawbacks.Therefore, a new secured DBMS architecture using IDS where there is no previous role mapping for users in an organization is proposed in this paper.A simple representation for SQL queries is proposed to enable the clustering algorithm to be easily used.A new clustering algorithm known as tube search with adaptive search memory (TSASM) is applied to database log files to create user profiles that demonstrate the roles for the relevant users.Then, each user query issued is checked against the related user profile using this classifier to determine whether or not the query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used.The issued query is transformed to the proposed simple representation using a classifier where the Euclidean distance between the centers and issued query for all profiles is calculated.The IDS considers the issued query to be an authorized query if the representative user profile has the minimum distance with it.Otherwise,the issued query is considered malicious.

    A synthetic data set is used for our experimental evaluations.Normal user access behavior for the database is modelled using this data set.The false negative (FN) and false positive (FP) rates are used to compare the proposed method with other methods.The experimental results indicate that the proposed method attains very small FN and FP rates.

    The reminder of the paper is organized as follows.Section 2 represents related work on the ID.Section 3 presents the proposed database ID based on a hybrid meta-heuristics algorithm including the basics of the proposed IDS architecture,the proposed simple representation for SQL queries,and the proposed method to build IDS.Section 4 explains the numerical experiments and algorithm evaluations.Section 5 presents conclusions.

    2 Related Work

    The literature shows that most IDS research has been focused on the networks area.For example, a survey on network-based and host-based IDS was proposed in [12].It defined corresponding systems characteristics.In addition, a prototype UNIX anomaly detection system was proposed in [13] as a hostbased system to monitor host users of computer networks.This system included an automatic anomaly detection element that used a test depending on self-organized maps for testing when user behavior was anomalous.IDS based on an extension of the use of previous attack signatures was proposed in [14].

    A payload-based network IDS was proposed in[15],where the normal application payload of network traffic was modelled in fully automatic style.In this method,a profile of byte frequency distribution and its payload standard was first computed.Second, the Mahalanobis distance was used to compare new data similarity against a threshold and create an alert if the new input distance exceeded the threshold.

    The literature indicates little research has been undertaken on IDS proposed for database ID.Therefore,a new DBMS architecture is required that involves adapting traditional DBMS architecture by adding an ID layer to handle internal threats.

    A new secured DBMS architecture was proposed in [16].It added IDS to DBMS to detect intruders,while work is maintained by the DBMS during periods of attack.Another IDS approach in real time was proposed in [17].It focused on exploiting data real-time properties to detect intruders.Unauthorized updated requests can be detected as they do not occur at the right time.This approach has some drawbacks, such as the use of objects of temporal data in real-time database systems, which have to be updated occasionally as mismatches in the updating period may cause alarm.

    Moreover,the detection of misuse in database systems(DEMIDS)approach was proposed in[18].It was tailored for relational database systems.Log files were used to derive profiles that described the access pattern behavior of database users.The approach used item sets, also known as attribute sets, that referenced together in the query to build the profiles.Users’ access could be described by these item sets while measures of distance among them were used to build the user profile.However, building a profile for each user could be considered the main drawback of the approach as this is a complicated task to implement for databases with large numbers of users.Hence, in our proposed approach profiles are built based on queries in log files instead of being based on the database scheme.

    Another IDS approach involving the back-end database was proposed in [19,20], and was based on transaction fingerprints.SQL statements were matched against a set of well-known legitimate database transaction fingerprints.

    An anomaly-based system was proposed for web databases in [21,22] and another anomaly-detection system approach for relational databases was proposed in [23,24].It focused on attribute relations in the database scheme.Two systems were used for detection via that approach:(1) One system that focused on attribute reference values in the relations database; and (2) One system that focused on Δ relations to record the history of data value changes for the monitored attributes among two runs of the anomaly detection system.This approach is similar to the DEMIDS approach as both assumed knowledge about the database relations and structure among database objects.

    Another approach that focused on web database attacks from users who make a large number of requests was proposed in [25] to handle only database floods.These requests can make a database slower when it interacts with other users.Profiles were used to model access control.In this method, one profile was built for the entire database and another profile was built for each user.

    Another IDS approach that depended on information from database log files was proposed in[26,27]to generate profiles that represent database users’typical access.New expression representations for queries in log files—known as the coarse quiplet(c-quiplet),the medium-grain quiplet(m-quiplet),and the fine quiplet(f-quiplet)—were proposed.The profiles were treated as the roles and every user was mapped into a special profile.Moreover,a machine learning algorithm was proposed to classify each user-issued query against the user’s mapped profile.

    Another database IDS using data-centric IDS was proposed in [28,29].Profiles were created by datacentric IDS to describe users’ normal access behavior.Profiles included statistical data that described the returned results from the execution of users’ previous queries.User behavior deviating from normal access behavior in profiles was defined as intrusion behavior.Syntax IDS was used by the data-centric system to handle dynamic databases and command parts where no data are returned from execution, such as delete, update,and insert.

    In summary, the literature shows that almost all of the existing approaches have several drawbacks.Thus, a new simple query representation in log files is proposed in this paper.This representation is based on using real values—instead of binary arrays—in database tables, as well as attribute size.If the tables and attributes are large, large memory resources are needed.Further, a new clustering algorithm named TSASM is used in this paper.Role granularity is supported in building profile representations where profiles represent roles instead of users.

    3 Proposed Database Intrusion Detection Based on Hybrid Meta-Heuristics Algorithm

    The system architecture, data representation,and methodology for the proposed database ID based on the hybrid meta-heuristics algorithm are explained in the following subsections.

    3.1 System Architecture

    In this paper, the system architecture for the traditional DBMS has been adapted by adding the ID mechanism before the execution process for queries.Thus,the DBMS uses the IDS to analyze each query before execution.Fig.1 shows the proposed IDS architecture.

    Figure 1:Proposed IDS architecture

    In this proposed IDS architecture, the query transformer is first used to work on the log files of the database to transform SQL queries to quiplets.Quiplets can be considered a simple representation of SQL queries.Second, the profile creator, which can be considered a clustering technique, is used to process these quiplets.This cluster technique is used to cluster the data from log files into profiles.All users with similar access behavior are represented using these profiles.Third, the detection engine, which is a machine learning algorithm known as the classifier, is used to determine whether the users’ issued queries are malicious or not.Fourth, the response policy base is used to identify the triggered action while a malicious query is detected.Authorized queries can mistakenly raise alarm using the proposed IDS.There are several occasional database user activities that can be classified as anomalous activity, such as fixing occasional problems.As the detection engine may not recognize these occasional activities, they can be considered intrusions.Further, each organization has policies for treating various situations in their response policy base.Sending an alarm to those responsible for the database, such as SSOs or DBAs, is an example of such polices.Last,the IDS uses authorized queries to update the profiles.

    3.2 Data Representation

    Extracting the information from log files is the most difficult challenge in the proposed approach.A query transformer is used to transform SQL queries into an applicable representation for classification and clustering algorithms.A simple representation for SQL queries, termed the quiplet, is used to build the profile blocks.Cluster algorithms in quiplets are used to build user profiles that detail normal interactions.

    Quiplets are built as short structures for SQL queries.Each query is transformed into quiplet form.The user may issue several commands, such as insert, delete, update, and select.The select query can be represented as follows:

    SELECT(Target-List),

    FROM(Relation-List),

    WHERE(Qualification).

    where SELECT is the command;Target-List includes all selected fields or attributes;Relation-List represents the field relations in tables,which represent the join conditions between tables;and Qualification represents the conditions that must be fulfilled by returned results.

    Each query is divided into five partitions and thus is known as a quiplet, which is the main unit of profiles.The quiplet is expressed as (Q(C,SR,SA,PR,PA)), where the five parts are command, selection relations, selection attributes, propagation relations, and propagation attributes [26].The f-quiplet representation is used as it can provide detailed information for each query.

    The quiplet representation form is applicable for all SQL commands including insert,delete,and update.Like the select command syntax, the delete and update commands have a qualification list and target list.However, the inserted data are placed in the relation and columns to be encoded as the projection relation and projection attributes respectively for the insert command syntax.

    The tables and attributes are represented in real numbers in the proposed query representation.The SR and SA, which represent the tables and attributes respectively in the target list, can be considered vector numbers of real value, as can the PR and PA, which represent the tables and attributes respectively in the qualification.They also can store the tables and attributes in the relation list when there is any join condition.Tab.1 provides an example of a database scheme.An example of transforming from query to quiplet representation is shown in Tab.2.

    Table 1:Database scheme example

    Each SR,SA,PR,and PA real vector number is represented by two computed values known as(1)the number average value in vector;and(2)the number standard deviation in vector.Further,the command text is represented in numbers of real value.A new quiplet (n-quiplet) representation, written as Q(C, SRAvg,SRStd, SAAvg, SAStd, PRAvg, PRStd, PAAvg, PAStd), is used.Tab.3 provides an example of n-quiplet form representation.

    3.3 Methodology

    There is no predefined role information in the worked database.In addition,there is no role hierarchy assigned to each user; thus, generating profiles can be considered an unsupervised operation.A clustering algorithm is employed to generate profiles from a training data set.These generated profiles are used to represent the roles.Clusters are mapped to users, as every specified user has one cluster that includes the maximum number of records in the log files of that user.One cluster may be allocated to one or more users.Further, a machine learning algorithm is used to classify each issued user query against the usermapped cluster for the ID process.

    A distance function is specified by the clustering algorithm to define the similarities and differences among quiplets.The distance function between any two quiplets is computed using the Euclidean function.The quiplets are represented using the real number where each quiplet has nine values.Suppose that we have two quiplets named Q1(C1, SRAvg1, SRStd1, SAAvg1, SAStd1,PRAvg1, PRStd1, PAAvg1,PAStd1)and Q2(C2, SRAvg2, SRStd2, SAAvg2, SAStd2, PRAvg2, PRStd2, PAAvg2, PAStd2).The distance function (θ)between the Q1 and Q2 quiplets can be calculated using Eq.(1):

    where

    The TSASM clustering algorithm is used in this paper.As the K-means(K-M)algorithm[30,31]can be easily implemented and showed better performance for real-world problems,it has been used in the TSASM.A tabu search(TS)is used to overcome K-M problems in this algorithm,such as receiving stuck in the local optima.Further, TS strategies such as diversification and intensification are used.The adaptive search memory(ASM) is used in this algorithm to cover the search space effectively and economically.

    The Euclidean distance method is used by TSASM to define the similarities and differences among data.The center of each cluster is calculated as the mean value for points belonging to the cluster.For instance,letXdenote the set of data objects;n, the number of data objects; andd, the dimensional spaceRd—that is,wherexi∈Rd,i=1,....,n—and we want to partition setXintoKpartitions.TSASM tries to obtain the best set of centers

    LetCjdenote the center of clusterSjwith cardinality|Sj|.Then we can calculateCj,j=1,…,Kaccording to the following equation:

    To measure the goodness of different sets of centers, the objective functionf(C) can be calculated for each set of centers using the minimum sum of squares[32,33],defined by:

    wherekcorresponds to the Euclidean norm.The TSASM output is theKset of centersCj,j=1,…,K,which partitions the data intoKclusters.These clusters can be considered profiles for users.

    Each user is mapped to their representative profile once it has been created using the clustering algorithm.A representative profile can be considered a profile that includes the maximum number of user-submitted queries.The proposed ID mechanism can be considered a simple classifier as it uses the θ between the issued query and the center of the mapped profile.The classifier is detected for both authorized and non-authorized queries.The query is used to update the profile and re-compute its center if it is an authorized query.Otherwise,an action is predefined in the response policy base using IDS triggers.

    4 Numerical Experiments

    A number of numerical experiments have been performed on a synthetic data set to verify the effectiveness of our proposed IDS algorithm.The data set is synthetically created to simulate users’access patterns in the real world.A zipf probability distribution function (PDF) is used to model the nonuniform user access and is defined for the random variableXusing Eq.(4):

    whereNis the number of elements andsis the parameter that characterizes the distribution.The cumulative density function for the zipf distribution whenNis equal to 10 with different values ofsis shown in Fig.2.

    Figure 2:Zipf PDF when N= 10

    In addition,uniform and multinomial PDFs are used in this paper.The multinomial distribution function can be considered a generalization of the binomial distribution,which is the probability distribution for the number of successes innindependent Bernoulli trials with the same probability of success in every trial.The analog of the Bernoulli distribution can be considered a categorical distribution in the multinomial distribution, where there arenindependent trials and every trial can result in one of a fixed finite numberKof possible outcomes through probabilitiesP1,…,Pk,forPi≥0for i=1,...,kand:

    SupposeXishows the number of times outcome numberiwas observed over thentrials.The vectorX=(X1,…,Xk)will follow the multinomial distribution based on parametersnandp,wherep=(p1,…,pk).

    4.1 Data Set

    A synthetic data set is generated to verify our proposed method by modelling real-world database log files.Each rolerhas probabilityP(r) of appearing in the log file.Each rolerhas five components with their own probability of appearing in the command.The probability for all necessary query components to appear is specified by the data set generator.Each commandcin rolerhas probabilityP(c|r) of appearing.Each tablethas probabilityP(Pt|r,c) of appearing in rolerin commandc, which can be applied to both propagation and selection tables.Moreover, each attributeabelonging to tablet (a∈t)has probabilityP(Pa|r,t,c) of appearing in rolerin commandc, which can be applied for both propagation and selection attributes.

    Malicious queries are created to simulate both internal and external threats.They are created from the same probability distribution via a different role number.For instance,when the role information related to a normal query is equal to 1,the role is simply changed to any role other than 1 to make the query anomalous.

    For our proposed method used to create the synthetic data set in this paper,the database scheme includes 20 tables and 10 columns in every table.It has nine roles,as shown in Tab.4.Query submissions for the roles are governed based on the PDF zipf(N=9,s=1).The first six roles can submit only selected queries as they are read-only.The last three roles can submit all commands including insert,update,delete,and select as they are read-write roles.They submit the commands insert,update,delete,and select with probabilities 0.1,0.7,0.1, and 0.1 respectively.The data set is generated with cardinality of 1000 queries.

    Table 4:Description of data set roles

    4.2 Results

    The experimental results for our proposed algorithm are compared with the IDS results,which use three query representations as follows:(1)m-quiplet;(2) c-quiplet; and(3)f-quiplet.

    The single query of the database log file is represented by a c-quiplet that includes five fields:SQL-CMD,PROJ-RELCOUNTER, PROJ-ATTR-COUNTER, SEL-REL-COUNTER, and SEL-ATTR-COUNTER.The SQL-CMD field is symbolic and links to the issued SQL command.The PROJ-RELCOUNTER and PROJ-ATTR-COUNTER fields are numerical and link to the number of relations and attributes involved in the SQL query projection part.The SEL-REL-COUNTER and SEL-ATTR-COUNTER fields are numerical and link to the number of relations and attributes that involved in the SQL query selection part.

    The single query of the database log file is represented by the m-quiplet,which includes five fields:SQLCMD, PROJ-REL-BIN[], PROJ-ATTR-COUNTER[], SELRELBIN[], and SEL-ATTR-COUNTER[].The SQL-CMD field is symbolic and links to the issued SQL command.The PROJ-REL-BIN[] field is a binary vector of size represented as a bit, which equals the number of relations in the database.The bit is set to 1 at positioniwhen theirelation in the SQL query is projected.The PROJ-ATTR-COUNTER []field is a vector of size equal to the number of relations in the database, where itsielement links to the attribute number of theirelation projected in the SQL query.SELRELBIN[], and SEL-ATTRCOUNTER[] have the same vectors as PROJ-REL-BIN[] and PROJ-ATTR-COUNTER[].However, the information is kept in the former—linked to the SQL query selections instead of the SQL query projections.

    A detailed representation of the log query is represented by the f-quiplet, which includes five fields:SQL-CMD, PROJ-REL-BIN[], PROJ-ATTR-BIN[][], SELRELBIN[], and SELATTR-BIN[][].The SQLCMD field is symbolic and links to the issued SQL command.The PROJ-REL-BIN[] field is a binary vector of size presented in bits, and equal to the number of relations in the database.The bit is set to 1 at positioniwhen theirelation in the SQL query is projected.PROJ-ATTR-BIN[][] is a vector of sizenwherenis the number of relations in the database.PROJ-ATTR-BIN[i][j] is equal to 1 when the projects of SQL queryjattribute ofirelation.Otherwise, it equals 0.The SELRELBIN[] field is a binary vector equal to 1 in itsiposition when theirelation is used in the preamble of a SQL query.SELATTR-BIN[][]is a vector of sizenwherenis the number of relations in the database.The SELATTR-BIN[i][j] is equal to 1 when the references of SQL queryjattribute ofirelation in the predicated query.Otherwise,it equals 0.

    The SQL command corresponding to the select statement is shown in Tab.5 with its representation based on all three quiplet types.A database scheme that includes two relations named R1 = A, B,C, D and R2=E,F,G,H is shown as an example.

    Table 5:Three examples of quiplet constructions

    Two clustering techniques,K-centers and K-M,were used in[5]for the clustering phase.Further,two ways of performing the ID task were used for every clustering algorithm:the na?ve Bayes classifier(NBC)and the outlier detection technique.

    Our results are reported for each n-quiplet representation and are compared using the two clustering methods.However, the TSASM algorithm is used in this paper for clustering data.In addition, a simple classifier based on Euclidean distance 1 is used for the ID task.

    The main idea of the NBC is that each instancexof the data is defined as the attribute value conjunction,and the target functionf(x)only has values from several finite setV.The attributes match a set of observations and the distinct classes are the elements ofVthat are associated with these observations.A set of training examples DT can be provided for the classification problem.Moreover, a new instance with values of attributes (a1,…,an) is specified, to predict the class or target value for the new instance.The most probable class value VMAP is assigned to the new instance and given the attributes (a1,…,an).

    The outlier detection technique is dependent on the median of absolute deviations (MAD) test [34].There arendata points as profile quiplets that can be assumed using the MAD test.Assume thatdidenotes a data point’s distanceifrom the cluster center to which is belongs.Assumeddenotes the median value ofdisfori=1,2,…,n.MADcan then be calculated using Eq.(6):

    Moreover,for every pointiwe compute:

    Checking if |Zi| >D, thendican be considered an outlier, which means that pointiis an outlier.Ddenotes a constant that is experimentally evaluated,where its value is assumed to be 1.5.

    The FN and FP rates are used for comparisons.FN represents the fraudulent transaction percentage identified as genuine and FP represents the genuine transaction percentage identified as malicious [35].

    The proposed algorithm is dominated all results of quiplet representations in the FN rates as shown in Figs.3(b), 3(d), 3(f), 3(h), 4(b), 4(d), 4(f), 4(h), 5(b), 5(d), 5(f) and 5(h).The results indicate that our proposed algorithm can result in very low FN rates.

    A comparison between the proposed algorithm and c-quiplet representation is shown in Figs.3(a)and 3(c)using the NBC via the K-M and K-centers approaches respectively.Strong performance can be achieved using the NBC classifier assis increased for both algorithms.However,our proposed algorithm can result in low FP rates,although performance is reduced if a simple classifier is used.

    A comparison between the proposed algorithm and c-quiplet representation is shown in Figs.3(e)and 3(g)using the outlier detection methodology via the K-M and K-centers approaches respectively.The results indicate that our proposed algorithm provides better results for allsvalues.

    A comparison between the proposed algorithm and m-quiplet representation is shown in Figs.4(a)and 4(c) using the NBC via the K-M and K-centers approaches respectively.The results shown in these two figures indicate that the NBC can lead to smaller FP rates than our proposed algorithm.When thesvalue is increased,the FP rate is reduced because of simple classifier performance.

    A comparison between the proposed algorithm and m-quiplet representation is shown in Figs.4(e)and 4(g)using the outlier detection methodology via the K-M and K-centers approaches respectively.The results indicate that our proposed algorithm gives better results for allsvalues.

    A comparison between the proposed algorithm and f-quiplet representation is shown in Figs.5(a)and 5(c) using the NBC via the K-M and K-centers approaches respectively.The results indicate that our proposed algorithm results in smaller FN rates than does the NBC algorithm fors= [0,2].Once the value ofsis increased above 2, the f-quiplet provides more desirable FP rates.Moreover, it can lead to lower FT rates fors=[0,4], ors=[2] if applying the NBC with K-centers.

    A comparison between the proposed algorithm and f-quiplet representation is shown in Figs.5(e)and 5(g)using the outlier detection methodology via the K-M and K-centers approaches respectively.The results indicate that our proposed algorithm gives better results for allsvalues.

    Figure 3:C-quiplet representation results

    Figure 4:M-quiplet representation results

    Figure 5:F-quiplet representation results

    5 Conclusion

    New challenges facing DBMS are presented in this paper.It explains how traditional DBMS can be effective for guaranteeing security appropriate for high-value data.A new DBMS architecture is proposed in this paper.The ID technique is used to protect the database against internal and external threats.IDS is used by organizations that do not have a clear role architecture assigned to every user.The TSASM clustering algorithm can be used to generate profiles from intrusion-free log files.A machine learning algorithm is used for the ID task for new issued queries.A synthetic database is built to represent real data log files.The experimental results indicate that the proposed method performs effectively against malicious transactions.The proposed method can lead to extremely low FN and FP rates; thus database security can be increased.However, this paper has the limitation that we only tested our proposed algorithm on one data set.Thus, in future, our algorithm should be tested with more than one large real data set.

    Funding Statement:The author received no specific funding for this study.

    Conflicts of Interest:The author declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品亚洲一区二区| 亚洲人成网站在线播| 亚洲精品国产成人久久av| 日本与韩国留学比较| 在线播放无遮挡| 精品99又大又爽又粗少妇毛片| 毛片女人毛片| 麻豆国产97在线/欧美| 精品国产乱码久久久久久小说| 中文欧美无线码| 国产精品久久久久久久久免| 久久精品久久精品一区二区三区| 少妇被粗大猛烈的视频| 国产探花极品一区二区| 直男gayav资源| 狂野欧美白嫩少妇大欣赏| 午夜福利视频精品| 亚洲成人中文字幕在线播放| 精品国产露脸久久av麻豆| 成人一区二区视频在线观看| 亚洲精品456在线播放app| 在线免费十八禁| 免费大片18禁| 黑人高潮一二区| 婷婷色综合大香蕉| 欧美精品人与动牲交sv欧美| 在线精品无人区一区二区三 | 亚洲最大成人中文| 在线观看免费视频网站a站| 极品教师在线视频| 春色校园在线视频观看| 久久久久人妻精品一区果冻| 少妇人妻久久综合中文| 亚洲精品亚洲一区二区| 在线天堂最新版资源| www.av在线官网国产| 91狼人影院| 欧美97在线视频| 亚洲不卡免费看| 18禁动态无遮挡网站| 国产乱来视频区| 啦啦啦中文免费视频观看日本| 又大又黄又爽视频免费| 人人妻人人爽人人添夜夜欢视频 | 久久精品久久久久久噜噜老黄| 91久久精品电影网| 国产在线免费精品| 免费人成在线观看视频色| 中文字幕亚洲精品专区| 一区二区三区乱码不卡18| 亚洲国产欧美人成| 十分钟在线观看高清视频www | 久久久a久久爽久久v久久| 国产乱来视频区| 偷拍熟女少妇极品色| 亚洲精品乱久久久久久| 成人国产麻豆网| 波野结衣二区三区在线| 97在线人人人人妻| 最近2019中文字幕mv第一页| 国产视频首页在线观看| 亚洲av国产av综合av卡| 性高湖久久久久久久久免费观看| 一个人免费看片子| 如何舔出高潮| 99热这里只有是精品在线观看| 亚洲综合精品二区| 久久精品久久精品一区二区三区| 亚洲国产欧美人成| av播播在线观看一区| 大陆偷拍与自拍| 国产成人一区二区在线| tube8黄色片| 涩涩av久久男人的天堂| 国产爽快片一区二区三区| 久久 成人 亚洲| 亚洲自偷自拍三级| 日本黄大片高清| 国产在线视频一区二区| 亚洲精品一二三| 国产在线一区二区三区精| 亚洲av免费高清在线观看| videossex国产| 日本av手机在线免费观看| 久久久久视频综合| 26uuu在线亚洲综合色| 亚洲欧美精品专区久久| 2022亚洲国产成人精品| 亚洲成色77777| www.av在线官网国产| 亚洲,欧美,日韩| 久久久久久久大尺度免费视频| 免费大片18禁| 天堂8中文在线网| 亚洲怡红院男人天堂| 欧美区成人在线视频| 久久99热6这里只有精品| 国语对白做爰xxxⅹ性视频网站| 国产精品三级大全| 日本wwww免费看| 人妻夜夜爽99麻豆av| 插逼视频在线观看| 在线天堂最新版资源| 网址你懂的国产日韩在线| 国产淫语在线视频| 乱系列少妇在线播放| 亚洲精品日本国产第一区| 日本一二三区视频观看| 成人无遮挡网站| 国产综合精华液| 啦啦啦中文免费视频观看日本| 国产黄片视频在线免费观看| 97在线视频观看| 亚洲欧洲日产国产| 777米奇影视久久| 亚洲自偷自拍三级| 亚洲精品日韩在线中文字幕| 日韩国内少妇激情av| 国产高清三级在线| 国产免费一区二区三区四区乱码| 久久影院123| 中国三级夫妇交换| 黄片wwwwww| av免费观看日本| 国产精品国产三级专区第一集| 精品国产露脸久久av麻豆| 欧美高清成人免费视频www| 伊人久久精品亚洲午夜| 不卡视频在线观看欧美| 久久婷婷青草| 亚洲av在线观看美女高潮| 高清毛片免费看| 免费看av在线观看网站| 狂野欧美激情性bbbbbb| 国产精品久久久久成人av| 综合色丁香网| 日韩成人av中文字幕在线观看| 色视频在线一区二区三区| 亚洲精品久久午夜乱码| 夫妻午夜视频| av又黄又爽大尺度在线免费看| 插逼视频在线观看| 精品少妇黑人巨大在线播放| 大又大粗又爽又黄少妇毛片口| 亚洲精品中文字幕在线视频 | 国产永久视频网站| 久久久久久久久久人人人人人人| 久久99热6这里只有精品| a 毛片基地| 亚洲高清免费不卡视频| 搡老乐熟女国产| 97在线视频观看| 偷拍熟女少妇极品色| 国产精品爽爽va在线观看网站| 久久久久人妻精品一区果冻| 一级毛片我不卡| 人人妻人人添人人爽欧美一区卜 | 亚洲真实伦在线观看| 午夜福利在线在线| 亚洲最大成人中文| 亚洲欧美日韩东京热| 国产欧美亚洲国产| 又爽又黄a免费视频| 亚洲不卡免费看| 啦啦啦啦在线视频资源| 亚洲av不卡在线观看| 欧美精品亚洲一区二区| 大香蕉97超碰在线| 美女福利国产在线 | 亚洲va在线va天堂va国产| 黄色怎么调成土黄色| 亚洲精品久久午夜乱码| 91久久精品国产一区二区成人| 亚洲欧美日韩卡通动漫| 久久影院123| 久久6这里有精品| 啦啦啦视频在线资源免费观看| 偷拍熟女少妇极品色| 日本午夜av视频| 黄片无遮挡物在线观看| 免费观看a级毛片全部| 欧美日韩在线观看h| 亚洲av.av天堂| 欧美国产精品一级二级三级 | 边亲边吃奶的免费视频| 久久久欧美国产精品| 小蜜桃在线观看免费完整版高清| 精品一品国产午夜福利视频| 尾随美女入室| 欧美激情极品国产一区二区三区 | 97热精品久久久久久| 久久青草综合色| 欧美zozozo另类| 精品久久久久久久末码| 中文乱码字字幕精品一区二区三区| 亚洲欧美清纯卡通| 日本欧美国产在线视频| 日本黄色片子视频| 国产亚洲av片在线观看秒播厂| 亚洲国产精品成人久久小说| 国产人妻一区二区三区在| 欧美精品亚洲一区二区| 免费在线观看成人毛片| 妹子高潮喷水视频| 自拍欧美九色日韩亚洲蝌蚪91 | 日本-黄色视频高清免费观看| 成人毛片60女人毛片免费| 国产亚洲5aaaaa淫片| 亚洲国产av新网站| 亚洲av成人精品一二三区| 日本色播在线视频| 久久久久精品久久久久真实原创| 久久久久精品久久久久真实原创| 各种免费的搞黄视频| 丰满迷人的少妇在线观看| 少妇猛男粗大的猛烈进出视频| 日韩免费高清中文字幕av| 少妇人妻精品综合一区二区| 蜜桃亚洲精品一区二区三区| 欧美成人午夜免费资源| 国产日韩欧美在线精品| 国产伦精品一区二区三区四那| 五月开心婷婷网| 九九在线视频观看精品| 国产高潮美女av| 看非洲黑人一级黄片| 两个人的视频大全免费| 亚洲激情五月婷婷啪啪| 免费高清在线观看视频在线观看| 久久久久视频综合| 一区二区三区四区激情视频| 午夜老司机福利剧场| 插阴视频在线观看视频| 免费观看性生交大片5| 卡戴珊不雅视频在线播放| 亚洲成人手机| 国产69精品久久久久777片| 亚洲四区av| 麻豆精品久久久久久蜜桃| av线在线观看网站| 精品一品国产午夜福利视频| 国产男女超爽视频在线观看| 日韩一本色道免费dvd| 中文欧美无线码| 免费播放大片免费观看视频在线观看| 麻豆国产97在线/欧美| 在线观看国产h片| 18禁在线无遮挡免费观看视频| 人妻少妇偷人精品九色| 一个人免费看片子| 国产毛片在线视频| 熟女电影av网| 男女啪啪激烈高潮av片| 啦啦啦在线观看免费高清www| 丰满少妇做爰视频| 中文字幕精品免费在线观看视频 | 人妻少妇偷人精品九色| 成年av动漫网址| 在线观看免费视频网站a站| 岛国毛片在线播放| 亚洲欧美一区二区三区黑人 | 少妇 在线观看| 久久久久久久大尺度免费视频| 成人综合一区亚洲| 日韩,欧美,国产一区二区三区| 插逼视频在线观看| 午夜福利网站1000一区二区三区| 亚洲欧美日韩无卡精品| 一级毛片电影观看| 国产免费视频播放在线视频| 女性被躁到高潮视频| 香蕉精品网在线| 久久久久久久久久成人| 2022亚洲国产成人精品| 成人国产av品久久久| 性色avwww在线观看| 国产成人aa在线观看| 欧美极品一区二区三区四区| av在线老鸭窝| 五月开心婷婷网| 久久99精品国语久久久| 国产伦精品一区二区三区视频9| 精品一区二区免费观看| 啦啦啦在线观看免费高清www| 欧美性感艳星| 在线免费十八禁| 伊人久久国产一区二区| 国产成人一区二区在线| 三级国产精品欧美在线观看| 深夜a级毛片| 亚洲欧洲日产国产| 国产精品国产三级国产av玫瑰| av又黄又爽大尺度在线免费看| 啦啦啦中文免费视频观看日本| 熟女人妻精品中文字幕| 亚洲av成人精品一区久久| 国产乱来视频区| 99热这里只有是精品在线观看| 伊人久久国产一区二区| 国产白丝娇喘喷水9色精品| 少妇人妻一区二区三区视频| 国产精品国产三级国产av玫瑰| 成人18禁高潮啪啪吃奶动态图 | 人妻系列 视频| 亚洲av在线观看美女高潮| 日韩在线高清观看一区二区三区| 亚洲成色77777| 日产精品乱码卡一卡2卡三| 久久久国产一区二区| 欧美成人一区二区免费高清观看| 久热久热在线精品观看| h视频一区二区三区| 久久国产精品大桥未久av | 国产探花极品一区二区| 伦理电影大哥的女人| 成人免费观看视频高清| 日韩欧美 国产精品| 久久国产乱子免费精品| 黄片wwwwww| 丰满迷人的少妇在线观看| 欧美日韩国产mv在线观看视频 | 22中文网久久字幕| 看非洲黑人一级黄片| 丰满迷人的少妇在线观看| 国内精品宾馆在线| 一级黄片播放器| 老熟女久久久| 亚洲无线观看免费| 国产精品一区二区三区四区免费观看| 22中文网久久字幕| 久久精品久久久久久噜噜老黄| 国产一区亚洲一区在线观看| 高清欧美精品videossex| 老师上课跳d突然被开到最大视频| 亚洲性久久影院| 亚洲av男天堂| 美女xxoo啪啪120秒动态图| 我要看黄色一级片免费的| av线在线观看网站| 性高湖久久久久久久久免费观看| 国产真实伦视频高清在线观看| 九九久久精品国产亚洲av麻豆| 中国国产av一级| 男男h啪啪无遮挡| 亚洲精品456在线播放app| 91狼人影院| 久久精品人妻少妇| 日韩中文字幕视频在线看片 | tube8黄色片| 免费观看av网站的网址| 中国三级夫妇交换| videossex国产| 国产精品久久久久久精品古装| 成人高潮视频无遮挡免费网站| 一边亲一边摸免费视频| a级毛色黄片| 另类亚洲欧美激情| 亚洲精品日韩在线中文字幕| 色哟哟·www| 国产美女午夜福利| 日韩欧美一区视频在线观看 | 三级经典国产精品| 日本与韩国留学比较| 舔av片在线| 男男h啪啪无遮挡| 韩国高清视频一区二区三区| 精品一区二区三卡| 国产爱豆传媒在线观看| 国产成人免费观看mmmm| 久久韩国三级中文字幕| 国产精品99久久99久久久不卡 | 女人十人毛片免费观看3o分钟| 国产无遮挡羞羞视频在线观看| 成人美女网站在线观看视频| 日日摸夜夜添夜夜添av毛片| 国产欧美亚洲国产| 久久精品久久久久久噜噜老黄| 好男人视频免费观看在线| 久久国内精品自在自线图片| 久久精品久久久久久久性| 久久婷婷青草| 99re6热这里在线精品视频| 亚洲精品日韩在线中文字幕| 精品一区在线观看国产| 亚洲国产精品成人久久小说| 国产亚洲av片在线观看秒播厂| 色网站视频免费| 99热网站在线观看| 大片电影免费在线观看免费| 美女内射精品一级片tv| 熟妇人妻不卡中文字幕| 99国产精品免费福利视频| 日韩人妻高清精品专区| 多毛熟女@视频| 成年人午夜在线观看视频| videos熟女内射| 国产精品久久久久久久电影| 国产一区亚洲一区在线观看| 六月丁香七月| 国产久久久一区二区三区| 欧美日韩一区二区视频在线观看视频在线| 少妇人妻 视频| 国产免费视频播放在线视频| 麻豆精品久久久久久蜜桃| 日韩一区二区视频免费看| 亚洲成色77777| 观看av在线不卡| 好男人视频免费观看在线| 亚洲av中文字字幕乱码综合| 亚洲天堂av无毛| 91在线精品国自产拍蜜月| 纯流量卡能插随身wifi吗| 国产男女超爽视频在线观看| 久久久久视频综合| 少妇人妻精品综合一区二区| 人人妻人人爽人人添夜夜欢视频 | 美女高潮的动态| 欧美人与善性xxx| 欧美日韩精品成人综合77777| 大片免费播放器 马上看| 一个人免费看片子| 中文天堂在线官网| 在线观看美女被高潮喷水网站| 蜜桃亚洲精品一区二区三区| 人人妻人人澡人人爽人人夜夜| 亚洲综合色惰| 春色校园在线视频观看| 中文字幕人妻熟人妻熟丝袜美| 插逼视频在线观看| 777米奇影视久久| 我要看黄色一级片免费的| 一个人免费看片子| 色综合色国产| 少妇被粗大猛烈的视频| 王馨瑶露胸无遮挡在线观看| 少妇精品久久久久久久| 久久久亚洲精品成人影院| 观看美女的网站| 成年av动漫网址| 成年美女黄网站色视频大全免费 | a级毛色黄片| 国产精品.久久久| 亚洲一级一片aⅴ在线观看| 熟女电影av网| 中国三级夫妇交换| 少妇 在线观看| 亚洲国产精品999| 美女主播在线视频| 免费观看的影片在线观看| 精品少妇黑人巨大在线播放| 久久精品国产自在天天线| 亚洲色图综合在线观看| 纯流量卡能插随身wifi吗| 亚洲aⅴ乱码一区二区在线播放| 尤物成人国产欧美一区二区三区| 成人毛片60女人毛片免费| 久久久精品94久久精品| 午夜精品国产一区二区电影| 亚洲精品乱码久久久久久按摩| 在线观看免费高清a一片| 一级毛片aaaaaa免费看小| 久久久亚洲精品成人影院| 91久久精品国产一区二区成人| 中文字幕人妻熟人妻熟丝袜美| 高清黄色对白视频在线免费看 | 少妇熟女欧美另类| 国产v大片淫在线免费观看| 成人毛片a级毛片在线播放| 在线观看免费高清a一片| 成人美女网站在线观看视频| 2022亚洲国产成人精品| 亚洲国产欧美人成| 内地一区二区视频在线| 免费高清在线观看视频在线观看| 午夜福利视频精品| 亚洲第一av免费看| 精品国产乱码久久久久久小说| 韩国高清视频一区二区三区| 男女啪啪激烈高潮av片| 午夜福利视频精品| 80岁老熟妇乱子伦牲交| 国产伦精品一区二区三区视频9| 欧美xxxx性猛交bbbb| 成人亚洲欧美一区二区av| 最近中文字幕高清免费大全6| 久久国产精品男人的天堂亚洲 | 中文天堂在线官网| 人妻 亚洲 视频| 七月丁香在线播放| 91精品国产九色| 伊人久久精品亚洲午夜| 久久久久人妻精品一区果冻| 午夜精品国产一区二区电影| 99久久精品热视频| 国产欧美日韩一区二区三区在线 | 亚洲欧美成人综合另类久久久| 一级a做视频免费观看| 有码 亚洲区| 亚洲精品第二区| 成人免费观看视频高清| 在线观看av片永久免费下载| 精品午夜福利在线看| 欧美日韩视频高清一区二区三区二| 亚洲高清免费不卡视频| 毛片女人毛片| 嘟嘟电影网在线观看| 最近最新中文字幕大全电影3| 久久鲁丝午夜福利片| 日本-黄色视频高清免费观看| 日韩伦理黄色片| 亚洲国产欧美在线一区| 最后的刺客免费高清国语| 中文字幕免费在线视频6| 日韩在线高清观看一区二区三区| 国产精品一区二区在线观看99| 亚洲精品国产色婷婷电影| 国产亚洲一区二区精品| 久久鲁丝午夜福利片| 一边亲一边摸免费视频| 欧美xxxx性猛交bbbb| 国产欧美日韩精品一区二区| 中文欧美无线码| 在线观看国产h片| 成人二区视频| 欧美老熟妇乱子伦牲交| 国产成人免费观看mmmm| 插阴视频在线观看视频| 亚洲国产毛片av蜜桃av| 亚洲成人中文字幕在线播放| 91精品国产国语对白视频| 亚洲人成网站在线播| 亚洲精品aⅴ在线观看| 国产一区亚洲一区在线观看| 国产 精品1| 国产欧美日韩精品一区二区| 自拍欧美九色日韩亚洲蝌蚪91 | 日韩一本色道免费dvd| 国产 精品1| 26uuu在线亚洲综合色| 欧美成人精品欧美一级黄| 亚洲av.av天堂| 精品亚洲乱码少妇综合久久| 夫妻午夜视频| 亚洲欧美成人精品一区二区| 一区二区三区免费毛片| 国产有黄有色有爽视频| 三级国产精品片| 欧美日韩在线观看h| 免费黄频网站在线观看国产| 久久久久视频综合| 亚洲国产精品999| 成人18禁高潮啪啪吃奶动态图 | 一区二区三区乱码不卡18| 国产白丝娇喘喷水9色精品| 国产精品熟女久久久久浪| 日本黄大片高清| 国产无遮挡羞羞视频在线观看| 日本与韩国留学比较| 精品人妻一区二区三区麻豆| 免费不卡的大黄色大毛片视频在线观看| 国产伦理片在线播放av一区| 超碰av人人做人人爽久久| 国产精品久久久久久久电影| 毛片女人毛片| 日本午夜av视频| 亚洲国产成人一精品久久久| 少妇的逼好多水| 99久久精品一区二区三区| 日日摸夜夜添夜夜爱| 性高湖久久久久久久久免费观看| 在线免费十八禁| 交换朋友夫妻互换小说| 久久精品国产亚洲av天美| 亚洲综合色惰| 国产毛片在线视频| 91久久精品国产一区二区成人| 交换朋友夫妻互换小说| 日本黄色片子视频| 亚洲自偷自拍三级| 日韩电影二区| 国产成人免费无遮挡视频| 免费大片黄手机在线观看| 国产精品久久久久久精品电影小说 | 亚洲精品乱码久久久久久按摩| 欧美成人精品欧美一级黄| 精品一区二区免费观看| 欧美成人午夜免费资源| 中国国产av一级| 久久亚洲国产成人精品v| 亚洲va在线va天堂va国产| 高清午夜精品一区二区三区| 亚洲av综合色区一区| av国产免费在线观看| 秋霞伦理黄片| 一级二级三级毛片免费看| 免费观看av网站的网址| 99久国产av精品国产电影| 最黄视频免费看| 在线亚洲精品国产二区图片欧美 | 亚洲欧美成人精品一区二区| 婷婷色综合www| 成年美女黄网站色视频大全免费 | 精品一区二区免费观看| 尾随美女入室| 午夜老司机福利剧场| 身体一侧抽搐| 超碰av人人做人人爽久久| 亚洲精品aⅴ在线观看| 久久精品夜色国产| 免费不卡的大黄色大毛片视频在线观看| 成人美女网站在线观看视频| 久久97久久精品| 亚洲经典国产精华液单| 在现免费观看毛片| 国产爱豆传媒在线观看|