Logo Goletty

Database Intrusion Detection using Weighted Sequence Mining
Journal Title Journal of Computers
Journal Abbreviation jcp
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (756 kb)
   
Title Database Intrusion Detection using Weighted Sequence Mining
Authors Majumdar, A.K.; Sural, Shamik; Srivastava, Abhinav
Abstract Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on web-based on-line transactions, the threat of security violations has also increased. Since a database stores valuable information of an application, its security has started getting attention. An intrusion detection system (IDS) is used to detect potential violations in database security. In every database, some of the attributes are considered more sensitive to malicious modifications compared to others. We propose an algorithm for finding dependencies among important data items in a relational database management system. Any transaction that does not follow these dependency rules are identified as malicious. We show that this algorithm can detect modification of sensitive attributes quite accurately. We also suggest an extension to the Entity- Relationship (E-R) model to syntactically capture the sensitivity levels of the attributes.
Publisher ACADEMY PUBLISHER
Date 2006-07-01
Source Journal of Computers Vol 1, No 4 (2006)
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html.

 

See other article in the same Issue


Goletty © 2024