基于应用语义的受损数据检测方法分析-analysis of damaged data detection method based on application semantics.docxVIP
- 5
- 0
- 约4.48万字
- 约 65页
- 2018-08-14 发布于上海
- 举报
基于应用语义的受损数据检测方法分析-analysis of damaged data detection method based on application semantics
AbstractThedatabasemanagementsystemisthemostcentralpartoftheinformationsystem,mostimportantinformationwerestoredinthedatabase,however,itoftenincurshackerattacksandthusresultssignificantlossestousers.Intrusiontolerantdatabasetechnologyisdesignedtorespondtotheintrusionhasoccurred,toensurethatthedatabasesystemtocontinuetoprovideservicesfrommaliciousattack.Asakeysub-moduleoftheinvasiontoleratedatabase,thedamageddatadetectionwereusedtodetecttheinfectedtransactionsaftertheattackhappened.Byanalyzingthedeficienciesoftraditionaldamageddatadetectionmethod,applicationsemanticswereintroducedintothetraditionalmethodtoimprovetheresultsofthedamageassessment,andonthisbasis,thearchitectureofthedamageddatadetectionsystembasedonapplicationsemanticswasdesigned.Thesystemisdividedintothetraditionaltransactiondependencymodule,applicationsemanticsmoduleanddamagedestimationmodule.Traditionaltransactiondependencymoduleaccordancetransactiondependentmodeltodetermineandrecorddependenciesbetweentransaction.Theapplicationsemanticsmoduleusessemantictechnologytohandlethetransactiondependenciesfromtraditionaltransactiondependencymodule.Thedamagedestimationmoduleanalyzesallinfectedtransactionsbyattacktransaction.Introducethekeytechnologyinthedamageddatadetectionsystembasedonapplicationsemantics.Transactiondependencygraph-basedtrackingtechnologytotrackthedependenciesbetweentransactions,andtoincreasesystemtablesavetransactionsdependencies.Tocompletethedefinitionoftheapplicationsemanticsinthecontextofdatabasesystems,thenusingsemanticrecognitiontechnologytoconvertthelow-leveldependencybetweentransactionstotheseniordependencybetweensemantics,andcuttinginvalidtransactiondependencybytheadvantageoftheincreasedbusinessrelationshiptable.Usingdamagedestimationalgorithmtocalculateallinfectedtransactionbyattacktransaction.Theexperimentalresultsshowthat,themethodofdamageddatadetectionbasedontheapplicationsemanticsissuperiortothemethodoftraditionaldamageddatadetection.Intermsofaccuracy,themethodbasedonsemanticscoul
您可能关注的文档
- 基于虚拟现实的leomeo卫星网络组网三维仿真关键技术的研究-research on key technologies of leo meo satellite network networking 3d simulation based on virtual reality.docx
- 基于虚拟样机技术对mg-300682型采煤机液压调高系统的研究-research on hydraulic adjustment system of mg - 300682 shearer based on virtual prototyping technology.docx
- 基于虚拟样机技术对mg 300682型采煤机液压调高系统的研究-research on hydraulic adjustment system of mg 300682 shearer based on virtual prototyping technology.docx
- 基于虚拟样机技术新型矿山防跑车限速车轮设计-design of new mine anti-speed limit wheel based on virtual prototype technology.docx
- 基于虚拟样机水稻田双螺旋式整梗机研制-research and development of double screw type stalk machine for paddy field based on virtual prototype.docx
- 基于虚拟仪器的小型断路器瞬动特性的检测技术分析-analysis of detection technology for instantaneous characteristics of small circuit breaker based on virtual instrument.docx
- 基于虚拟仪器构架的电子测量工作站软件集成技术分析-software integration technology analysis of electronic measurement workstation based on virtual instrument framework.docx
- 基于虚拟仪器技术激光修整超硬磨料砂轮测控系统设计-design of laser dressing ultra-hard abrasive wheel measurement and control system based on virtual instrument technology.docx
- 基于需求侧响应的电动汽车有序充电分析-analysis of orderly charging of electric vehicles based on demand side response.docx
- 基于需求分析的高职英语课堂分层教学设计——以《走出牛津》unit2模块i为例-hierarchical teaching design of english classes in higher vocational colleges based on demand analysis - taking unit 2 module i in.docx
原创力文档

文档评论(0)