- Anglický jazyk
Implementation of Database intrusion Detection
Autor: Jay Kant Pratap Singh Yadav
Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes.... Viac o knihe
Na objednávku, dodanie 2-4 týždne
33.30 €
bežná cena: 37.00 €
O knihe
Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results
- Vydavateľstvo: LAP LAMBERT Academic Publishing
- Rok vydania: 2017
- Formát: Paperback
- Rozmer: 220 x 150 mm
- Jazyk: Anglický jazyk
- ISBN: 9783330079014