Overview of Intrusion Detection Techniques in Database

Authors

Abstract:

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized people. To overcome these concerns, there are several security layers between the user and the data in the network layer, host, and database. For instance, security mechanisms, including firewall, data encryption, intrusion detection systems, etc., are used to prevent infiltration. Database Intrusion Detection System uses a variety of data mining techniques to detect abnormalities and detect malicious and intrusive activities. In this paper, a category of intrusion detection techniques is presented first in the database, and a review of the general algorithms for intrusion detection in databases is demonstrated. Since signature-based methods are elder and less complex and less diverse, the main focus of this paper is on behavioral methods.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Classification Techniques for Intrusion Detection - An Overview

Security is becoming a critical part of organizational information systems and security of a computer system or network is compromised when an intrusion takes place. In the field of computer networks security, the detection of threats or attacks is nowadays a critical problem to solve. Intrusion Detection Systems (IDS) have become a standard component in network security infrastructures and is ...

full text

Intrusion Detection System: Overview

Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lea...

full text

Intrusion Detection Techniques

ion-Based Intrusion Detection The implementation of many misuse detection approaches shares a common problem: Each system is written for a single environment and has proved difficult to use in other environments that may have similar policies and concerns. The primary goal of abstraction-based intrusion detection is to address this problem.

full text

Survey of Intrusion Detection Techniques in LEACH

Security of Wireless sensor network (WSN) turn out to be a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Clustered Networks have been proposed to reduce the power consumption in sensor networks. LEACH is a clustering based protocol that lessens energy dissipation in ...

full text

Intrusion detection techniques and approaches

Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and recognising normal and abusive system behaviour. Such methodologies include: statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matc...

full text

Intrusion Detection: Techniques and Approaches

Intrusion detection plays one of the key roles in computer system security techniques. This paper is dedicated to this topic. It describes major approaches to intrusion detection and focuses on methods used by intrusion detection systems. We do not describe in this paper details of existing intrusion detection system. Instead, we concentrate on underlying principles and methods. This paper can ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 7  issue 2

pages  62- 55

publication date 2019-08

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023