{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T13:14:23Z","timestamp":1718025263583},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T00:00:00Z","timestamp":1387497600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10844-013-0286-z","type":"journal-article","created":{"date-parts":[[2013,12,19]],"date-time":"2013-12-19T07:49:37Z","timestamp":1387439377000},"page":"619-644","source":"Crossref","is-referenced-by-count":9,"title":["Detecting intrusion transactions in database systems:a novel approach"],"prefix":"10.1007","volume":"42","author":[{"given":"Mina","family":"Sohrabi","sequence":"first","affiliation":[]},{"given":"Mohammad M.","family":"Javidi","sequence":"additional","affiliation":[]},{"given":"Sattar","family":"Hashemi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,20]]},"reference":[{"key":"286_CR1","unstructured":"Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In Proceedings of the 20th international conference on very large databases (pp. 487\u2013499). Santiago."},{"key":"286_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., & Srikant, R. (1995). Mining sequential patterns. In Proceedings of the 1995 international conference data engineering (pp. 3-14). Taipei.","DOI":"10.1109\/ICDE.1995.380415"},{"key":"286_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A. (1993). Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD conference on management of data (pp. 207\u2013216). Washington.","DOI":"10.1145\/170036.170072"},{"key":"286_CR4","unstructured":"Barbara, D., Goel, R., Jajodia, S. (2002). Mining malicious data corruption with Hidden Markov Models. In Proceedings of the 16th annual IFIP WG 11.3 working conference on data and application security. Cambridge."},{"key":"286_CR5","volume-title":"Proceedings of the IEEE workshop on information assurance and security","author":"D Barbara","year":"2001","unstructured":"Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N. (2001). ADAM: detecting intrusions by data mining. In Proceedings of the IEEE workshop on information assurance and security. New York: IEEE Press."},{"key":"286_CR6","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J. (1998). Efficiently mining long patterns from databases. In Proceedings of the 1998 ACM-SIGMOD international conference on management of data (pp. 85\u201393).","DOI":"10.1145\/276304.276313"},{"key":"286_CR7","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., & Agrawal, R. (1999). Mining the most interesting rules. In Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 145\u2013154).","DOI":"10.1145\/312129.312219"},{"key":"286_CR8","doi-asserted-by":"crossref","unstructured":"Bertino, E., Kamra, A., Terzi, E., Vakali, A. (2005). Intrusion detection in RBAC-administered databases. In Proceedings of 21st annual computer security applications conference (pp. 170\u2013182).","DOI":"10.1109\/CSAC.2005.33"},{"key":"286_CR9","first-page":"283","volume-title":"International conference on data mining","author":"S Bon","year":"2006","unstructured":"Bon, S., & Negmat, M. (2006). Extracting forensic explanation from intrusion alerts. In International conference on data mining (pp. 283\u2013289). Las Vegas: CSREA Press."},{"key":"286_CR10","volume-title":"SNORT 2.1 Intrusion detection","author":"B Casewell","year":"2004","unstructured":"Casewell, B., & Beale, J. (2004). SNORT 2.1 Intrusion detection, 2nd edn. Massachusetts: Syngress.","edition":"2"},{"key":"286_CR11","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-0-387-35501-6_12","volume-title":"Integrity and internal control information systems: strategic views on the need for control","author":"CY Chung","year":"2000","unstructured":"Chung, C.Y., Gertz, M., Levitt, K. (2000). Demids: a misuse detection system for database systems. Integrity and internal control information systems: strategic views on the need for control (pp. 159\u2013178). Norwell: Kluwer."},{"key":"286_CR12","doi-asserted-by":"crossref","unstructured":"Cohen, E., Datar, M., Fujiwara, S., Gionis, A., Indyk, R., Motwani, P., Ullman, J., Yang, C. (2000). Finding interesting associations without support pruning. In Proceedings of international conference on data engineering.","DOI":"10.1109\/ICDE.2000.839448"},{"key":"286_CR13","volume-title":"Next generation data mining","author":"L Ertoz","year":"2004","unstructured":"Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivava, J., Kumar, V., Dokas, P. (2004). The MINDS \u2013 Minnesota intrusion detection system. In Next generation data mining. Boston: MIT Press."},{"key":"286_CR14","volume-title":"Applications of data mining in computer security","author":"E Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. Applications of data mining in computer security. Dordrecht: Kluwer."},{"key":"286_CR15","volume-title":"Proceedings of the 1st IEEE International conference on data mining","author":"W Fan","year":"2001","unstructured":"Fan, W., Miller, M., Stolfo, S., Lee, W., Chan, P. (2001). Using artificial anomalies to detect unknown and known network intrusions. In Proceedings of the 1st IEEE international conference on data mining. New York: IEEE Press."},{"key":"286_CR16","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A. (1996). A Sense of self for unix processes. In Proceedings of the 1996 IEEE symposium on security and privacy, IEEE computer society press (pp. 120\u2013128).","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"286_CR17","unstructured":"Frank, J. (1994). Artificial intelligence and intrusion detection: current and future directions. In Proceedings of the 17th national computer security conference."},{"issue":"5","key":"286_CR18","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1111\/j.1468-0394.2008.00467.x","volume":"25","author":"S Hashemi","year":"2008","unstructured":"Hashemi, S., Yang, Y., Zabihzadeh, D., Kangavari, M. (2008). Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Systems, 25(5), 460\u2013473.","journal-title":"Expert Systems"},{"key":"286_CR19","unstructured":"Hashler, M. (2011). A comparison of commonly used interest measures for association rules. http:\/\/michael.hahsler.net\/research\/association_rules\/measures.html ."},{"key":"286_CR20","volume-title":"Technical Report","author":"R Heady","year":"1990","unstructured":"Heady, R., Luger, G., Maccabe, A., Servilla, M. (1990). The architecture of a network level intrusion detection system. Technical Report. University of New Mexico: Computer Science Department."},{"key":"286_CR21","doi-asserted-by":"crossref","unstructured":"Hu, Y., & Panda, B. (2004). A data mining approach for database intrusion detection. In Proceedings of the ACM symposium on applied computing (pp. 711\u2013716).","DOI":"10.1145\/967900.968048"},{"key":"286_CR22","doi-asserted-by":"crossref","unstructured":"Hu, Y., & Panda, B. (2010). Mining inter-transaction data dependencies for database intrusion detection. In Proceedings of innovations and advances in computer sciences and engineering. Springer.","DOI":"10.1007\/978-90-481-3658-2_12"},{"issue":"1","key":"286_CR23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TDSC.2007.9","volume":"4","author":"K Hwang","year":"2007","unstructured":"Hwang, K., Cai, M., Chen, Y., Qin, M. (2007). Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Transactions on Dependency and Secure Computing, 4(1), 41\u201355.","journal-title":"IEEE Transactions on Dependency and Secure Computing"},{"key":"286_CR24","doi-asserted-by":"crossref","unstructured":"Javidi, M.M., Sohrabi, M., Kuchaki Rafsanjani, M. (2010). Intrusion detection in database systems. In Proceedings of FGCN 2010, Part II, CCIS, 120 (pp. 93\u2013101).","DOI":"10.1007\/978-3-642-17604-3_10"},{"issue":"10","key":"286_CR44","doi-asserted-by":"crossref","first-page":"3550","DOI":"10.17485\/ijst\/2012\/v5i10.20","volume":"5","author":"MM Javidi","year":"2012","unstructured":"Javidi, M.M., Kuchaki Rafsanjani, M., Hashemi, S., Sohrabi, M. (2012). An overview of anomaly based database intrusion detection systems. Indian Journal of Science and Technology 5(10), 3550\u20133559.","journal-title":"Indian Journal of Science and Technology"},{"key":"286_CR25","doi-asserted-by":"crossref","unstructured":"Javitz, H.S., & Valdes, A. (1991). The SRI IDES statistical anomaly detector. In Proceedings of the IEEE symposium on security and privacy.","DOI":"10.1109\/RISP.1991.130799"},{"issue":"2","key":"286_CR26","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1145\/762476.762479","volume":"6","author":"G Karjoth","year":"2003","unstructured":"Karjoth, G. (2003). Access control with IBM tivoli access manager.ACM Transactions on Information and Systems Security (TISSEC), 6(2), 232\u2013257.","journal-title":"ACM Transactions on Information and Systems Security (TISSEC)"},{"key":"286_CR27","first-page":"54","volume-title":"Proceedings of the international symposium on recent advances in intrusion detection (RAID \u201902)","author":"KS Killourhy","year":"2002","unstructured":"Killourhy, K.S., & Maxion, R.A. (2002). Undermining an anomaly-based intrusion detection system using common exploits. In Proceedings of the international symposium on recent advances in intrusion detection (RAID \u201902) (pp. 54\u201373). Berlin: Springer."},{"key":"286_CR28","first-page":"124","volume-title":"Proceedings of the sixth IEEE real time technology and applications symposium (RTAS\u201900)","author":"VC Lee","year":"2000","unstructured":"Lee, V.C., Stankovic, J., Son, S.H. (2000). Intrusion detection in real-time database systems via time signatures. In Proceedings of the sixth IEEE real time technology and applications symposium (RTAS\u201900) (pp. 124\u2013133). New York: IEEE Press."},{"issue":"6","key":"286_CR29","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J., Mok, K. (2000). Adaptive intrusion detection: a data mining approach. Artificial Intelligence Review, 14(6), 533\u2013567.","journal-title":"Artificial Intelligence Review"},{"key":"286_CR30","volume-title":"Applications of data mining in computer security","author":"S Noel","year":"2002","unstructured":"Noel, S., Wijesekera, D., Youman, C. (2002). Modern intrusion detection, data mining, and degrees of attack guilt. In Applications of data mining in computer security. Dordrecht: Kluwer."},{"key":"286_CR31","volume-title":"Proceedings of the 7","author":"V Paxson","year":"2008","unstructured":"Paxson, V. (1998). Bro: a system for detecting network intrusions in real time. In Proceedings of the 7 th $^{th}$ USENIX security symposium. Berkeley: USENIX Association."},{"key":"286_CR32","first-page":"229","volume-title":"Knowledge discovery in databases AAAI","author":"G Piatetsky-Shapiro","year":"1991","unstructured":"Piatetsky-Shapiro, G. (1991). Discovery, analysis, and presentation of strong rules. In G., Piatetsky-Shapiro, & J., Frawley (Eds.), Knowledge discovery in databases AAAI (pp. 229\u2013248). Cambridge: MIT Press."},{"key":"286_CR33","volume-title":"Proceedings of the IEEE conference on network computing and applications (NAC \u201904)","author":"M Qin","year":"2004","unstructured":"Qin, M., & Hwang, K. (2004). Frequent episode rules for Internet traffic analysis and anomaly detection. In Proceedings of the IEEE conference on network computing and applications (NAC \u201904). New York: IEEE Press."},{"key":"286_CR34","first-page":"229","volume-title":"Proceedings of the USENIX 13th systems administration conference (LISA \u201999)","author":"M Roesch","year":"1999","unstructured":"Roesch, M. (1999). SNORT \u2013 lightweight intrusion detection for networks. In Proceedings of the USENIX 13th systems administration conference (LISA \u201999) (pp. 229\u2013238). Berkeley: USENIX Association."},{"key":"286_CR35","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R. (2000). The NIST model for role based access control: towards a unified standard. In Proceedings of the 5th ACM workshop on role based access control.","DOI":"10.1145\/344287.344301"},{"issue":"4","key":"286_CR37","doi-asserted-by":"crossref","first-page":"8","DOI":"10.4304\/jcp.1.4.8-17","volume":"1","author":"A Srivastava","year":"2006","unstructured":"Srivastava, A., Sural, S., Majumdar, A.K. (2006). Database intrusion detection using weighted sequence mining. Journal of Computers, 1(4), 8\u201317.","journal-title":"Journal of Computers"},{"key":"286_CR38","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-45372-5_25","volume-title":"Proceedings of the fourth European conference on principles of data mining and knowledge discovery (PKDD2000)","author":"L Todorovski","year":"2000","unstructured":"Todorovski, L., Flach, P., Lavrac, N. (2000). Predictive performance of weighted relative accuracy. In D. A., Zighed, J., Komorowski, J., Zytkow (Eds.), Proceedings of the fourth European conference on principles of data mining and knowledge discovery (PKDD2000) (pp. 255\u2013264). Springer-Verlag."},{"key":"286_CR39","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1613\/jair.227","volume":"3","author":"GI Webb","year":"1995","unstructured":"Webb, G.I. (1995). OPUS: an efficient admissible algorithm for unordered search. Journal of Artificial Intelligence Research, 3, 431\u2013465.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"286_CR40","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/347090.347112","volume-title":"The Sixth ACM SIGKDD international conference on knowledge discovery and data mining","author":"GI Webb","year":"2000","unstructured":"Webb, G.I. (2000). Efficient search for association rules. In The Sixth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 99\u2013107). Boston: The Association for computing machinery."},{"issue":"1","key":"286_CR42","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10618-005-0255-4","volume":"10","author":"GI Webb","year":"2005","unstructured":"Webb, G.I., & Zhang, S. (2005). K-Optimal rule discovery. Data Mining and Knowledge Discovery, 10(1), 39\u201379.","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"286_CR43","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.484228","volume":"10","author":"GB White","year":"1996","unstructured":"White, G.B., Fisch, E.A., Pooch, U.W. (1996). Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 10(1), 20\u201323.","journal-title":"IEEE Network"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-013-0286-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-013-0286-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-013-0286-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T14:43:57Z","timestamp":1597243437000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-013-0286-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,20]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["286"],"URL":"https:\/\/doi.org\/10.1007\/s10844-013-0286-z","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,20]]}}}