Loading [a11y]/accessibility-menu.js
Database intrusion detection by transaction signature | IEEE Conference Publication | IEEE Xplore
Scheduled Maintenance: On Saturday, 19 July, IEEE Xplore will undergo scheduled maintenance from 7:00 AM-11:00 AM ET. During this time, there will be periods when the website will be unavailable.

Database intrusion detection by transaction signature


Abstract:

In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitt...Show More

Abstract:

In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.
Date of Conference: 26-28 July 2012
Date Added to IEEE Xplore: 31 December 2012
Conference Location: Coimbatore, India

Contact IEEE to Subscribe

References

References is not available for this document.