Database Intrusion Detection by Transaction Signature

被引:0
|
作者
Rathod, Yagnik A. [1 ]
Chaudhari, M. B. [1 ]
Jethava, G. B.
机构
[1] GEC, CE Dept, Gandhinagar, Gujarat, India
关键词
Database Security; Log mining; Intrusion detection;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose an approach for intrusion detection system for database management system. Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Research on Intrusion Detection of Database based on Rough Set
    Zhang, Jihong
    Chen, Xiaoquan
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1637 - 1641
  • [32] A survey on database intrusion detection: approaches, challenges and application
    Jindal, Rajni
    Singh, Indu
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2019, 7 (06) : 559 - 592
  • [33] Analysis of database abnormity intrusion based outliers detection
    Yuan Zhong-yi
    Tang Wen-zhong
    Xu Xiao-lin
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1144 - 1147
  • [34] Role of Soft Outlier Analysis in Database Intrusion Detection
    Brahma, Anitarani
    Panigrahi, Suvasini
    ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 479 - 489
  • [35] An Immune Based Relational Database Intrusion Detection Algorithm
    Dong, Xiaomei
    Li, Xiaohua
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 295 - +
  • [36] Database Intrusion Detection using Weighted Sequence Mining
    Srivastava, Abhinav
    Sural, Shamik
    Majumdar, A. K.
    JOURNAL OF COMPUTERS, 2006, 1 (04) : 8 - 17
  • [37] Architecture for data collection in database intrusion detection systems
    Jin, Xin
    Osborn, Sylvia L.
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2007, 4721 : 96 - +
  • [38] Illegal intrusion detection based on hidden information database
    Shen, Huizhang
    Zhao, Jidi
    Wang, Huanchen
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 79 - 84
  • [39] Database intrusion detection using weighted sequence mining
    School of Information Technology, Indian Institute of Technology, Kharagpur, 721302, India
    不详
    J. Comput., 2006, 4 (8-17):
  • [40] An Effective Log Mining Approach for Database Intrusion Detection
    Hu, Yi
    Campan, Alina
    Walden, James
    Vorobyeva, Irina
    Shelton, Justin
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,