基于应用语义的受损数据检测方法分析-analysis of damaged data detection method based on application semantics.docxVIP

  • 5
  • 0
  • 约4.48万字
  • 约 65页
  • 2018-08-14 发布于上海
  • 举报

基于应用语义的受损数据检测方法分析-analysis of damaged data detection method based on application semantics.docx

基于应用语义的受损数据检测方法分析-analysis of damaged data detection method based on application semantics

AbstractThedatabasemanagementsystemisthemostcentralpartoftheinformationsystem,mostimportantinformationwerestoredinthedatabase,however,itoftenincurshackerattacksandthusresultssignificantlossestousers.Intrusiontolerantdatabasetechnologyisdesignedtorespondtotheintrusionhasoccurred,toensurethatthedatabasesystemtocontinuetoprovideservicesfrommaliciousattack.Asakeysub-moduleoftheinvasiontoleratedatabase,thedamageddatadetectionwereusedtodetecttheinfectedtransactionsaftertheattackhappened.Byanalyzingthedeficienciesoftraditionaldamageddatadetectionmethod,applicationsemanticswereintroducedintothetraditionalmethodtoimprovetheresultsofthedamageassessment,andonthisbasis,thearchitectureofthedamageddatadetectionsystembasedonapplicationsemanticswasdesigned.Thesystemisdividedintothetraditionaltransactiondependencymodule,applicationsemanticsmoduleanddamagedestimationmodule.Traditionaltransactiondependencymoduleaccordancetransactiondependentmodeltodetermineandrecorddependenciesbetweentransaction.Theapplicationsemanticsmoduleusessemantictechnologytohandlethetransactiondependenciesfromtraditionaltransactiondependencymodule.Thedamagedestimationmoduleanalyzesallinfectedtransactionsbyattacktransaction.Introducethekeytechnologyinthedamageddatadetectionsystembasedonapplicationsemantics.Transactiondependencygraph-basedtrackingtechnologytotrackthedependenciesbetweentransactions,andtoincreasesystemtablesavetransactionsdependencies.Tocompletethedefinitionoftheapplicationsemanticsinthecontextofdatabasesystems,thenusingsemanticrecognitiontechnologytoconvertthelow-leveldependencybetweentransactionstotheseniordependencybetweensemantics,andcuttinginvalidtransactiondependencybytheadvantageoftheincreasedbusinessrelationshiptable.Usingdamagedestimationalgorithmtocalculateallinfectedtransactionbyattacktransaction.Theexperimentalresultsshowthat,themethodofdamageddatadetectionbasedontheapplicationsemanticsissuperiortothemethodoftraditionaldamageddatadetection.Intermsofaccuracy,themethodbasedonsemanticscoul

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档