Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Intrusion Detection and Containment in Database Systems
#1

[attachment=128]
[attachment=129]
many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The ISDs work for early detection of attacks and make the recovery of lost or damaged data simpler. Many researchers are working on increasing the intrusion detection efficiency and accuracy. But most of these efforts are to detect the intrusions at network or operating system level. They are not capable of detecting corruption data due to malicious transactions in databases. We will discuss different ways of detecting the malicious transactions and ways to recover the data from those malicious transactions. Mainly we will see the data mining solution proposed by Yi Hu et al for database intrusion detection and solution by Paul Ammann et al for recovery from the malicious transactions
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.