A different approach of intrusion detection and Response System for Relational Databases

J Parmar, P Jain - 2013 International Conference on Green …, 2013 - ieeexplore.ieee.org
Database is an important part for any organization and this database needs to make secure
from various attacks in the network. Although there are various techniques implemented in …

A classification based approach to create database policy for Intrusion Detection and Respond anomaly requests

J Parmar - 2014 Conference on IT in Business, Industry and …, 2014 - ieeexplore.ieee.org
Database is an important asset of any leading and emerging industry and this database
needs to improved security features from various threats in the network and database …

A novel method for intrusion detection in relational databases

R Ramachandran, P Arya… - … Conference on Advances …, 2017 - ieeexplore.ieee.org
The importance of data security and confidentiality increases day by day, since for most
companies and organizations data remains as the most important asset. Standard database …

Database security threats: A survey study

NA Al-Sayid, D Aldlaeen - 2013 5th international conference on …, 2013 - ieeexplore.ieee.org
Databases are the repositories of the most important and expensive information in the
enterprise. With the increase in access to data stored in databases, the frequency of attacks …

Efficient and effective security model for database specially designed to avoid internal threats

AA Shastri, PN Chatur - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Since the information or data stored in databases are usually considered as vulnerable and
also important corporate resource, security is of uttermost importance in any database …

Interactive multi-layer policies for securing relational databases

MH Abdel-Aziz, IM El-Henawy… - … on Information Society (i …, 2012 - ieeexplore.ieee.org
The security of database depends on a set of systems, roles, procedures, and processes that
protect the entire database from unintended activities. These unintended activities can be …

The structure design of database security monitoring system based on IDS

Z Xing, H Wei - 2010 2nd International Conference on …, 2010 - ieeexplore.ieee.org
Database as enterprise data information aggregation is a core component of enterprise
information storage, its security is essential. Database security should not only concern the …

Machine learning proposed approach for detecting database intrusions in RBAC enabled databases

UP Rao, GJ Sahani, DR Patel - 2010 second international …, 2010 - ieeexplore.ieee.org
Information is valuable asset of any organization which is stored in databases. Data in such
databases may contain credit card numbers, social security number or personal medical …

A novel intrusion detection system model for securing web-based database systems

S Wenhui, TDH Tan - 25th Annual International Computer …, 2001 - ieeexplore.ieee.org
Intrusion detection (ID) has become an important technology for protecting information
resources and databases from malicious attacks and information leakage. This paper …

Data security, intrusion detection, database access control, policy creation and anomaly response systems-A review

J Parmar - 2014 International Conference on Advances in …, 2014 - ieeexplore.ieee.org
Information is the most valuable asset for organizations. Web database is combination of
database and web technology. In Past few decades database user increasing very rapidly …