Multi-dimensional and Multi-level Data Dependency with Attribute Sensitivity for Database Intrusion Detection

نویسندگان

  • Indr Jeet Rajput
  • Udai Pratap Rao
چکیده

here we propose database intrusion detection system and it works on data mining technique. In recent era the state of art in the field of database intrusion detection mechanisms where the researchers worked on single attribute, multiple attribute or sensitivity of attribute to generate the data dependency. Our proposed approach work is also based on data dependency rule generation from database transaction. But in our approach we consider both multi-level and multiple-dimensional data dependency with attribute sensitivity for identifying anomalous database transaction. Since data dependency reflect correlation between data item and if any transaction that does not follow these dependency rules are identified as malicious Keywords— Data Mining, Database security, Intrusion detection system, support, confidence, Malicious transaction, Data dependency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Sensitivity Analysis of TOPSIS Technique: The Results of Change in the Weight of One Attribute on the Final Ranking of Alternatives

Most of data in Multi-attribute decision making (MADM) problems are changeable rather than constant and stable. Therefore, sensitivity analysis after problem solving can effectively contribute to making accurate decisions. In this paper, we offer a new method for sensitivity analysis in multi-attribute decision making problems in which if the weights of one attribute changes, then we can dete...

متن کامل

Sensitivity Analysis of Simple Additive Weighting Method (SAW): The Results of Change in the Weight of One Attribute on the Final Ranking of Alternatives

Most of data in a multi-attribute decision making (MADM) problem are unstable and changeable, then sensitivity analysis after problem solving can effectively contribute to making accurate decisions. This paper provides a new method for sensitivity analysis of MADM problems so that by using it and changing the weights of attributes, one can determine changes in the final results of a decision ma...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013