Framework to Detect Malicious Transactions in Database System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Database Security Architecture for Detection of Malicious Transactions in Database

The protection of the data over the database is some how mandatory for the organization, so there is a demand of the security mechanism to protect the database. Even the existing security measures at the database application level are not able to protect the database completely from some malicious actions and reason may be especially because of insider attack. The main objective here, is to des...

متن کامل

A Proficient Way to Avert Malicious Transactions in Database Management System

In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...

متن کامل

iii MANAGING MALICIOUS TRANSACTIONS IN MOBILE DATABASE SYSTEMS

Database security is one of the most important issues for any organization, especially for financial institutions such as banks. Protecting database from external threats is relatively easier and a number of effective security schemes are available to organizations. Unfortunately, this is not so in the case of threats from insiders. Existing security schemes for such threats are some variation ...

متن کامل

Recovery from Malicious Transactions

Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving partial, but not complete, damage. In particular, we work in the database context and consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for co...

متن کامل

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2015

ISSN: 0975-8887

DOI: 10.5120/19292-0724