Abstract:
Database management system is not enough for new high-tech attack, so Database Intrusion Detection System is required as additional security layer. Over the last few year...Show MoreMetadata
Abstract:
Database management system is not enough for new high-tech attack, so Database Intrusion Detection System is required as additional security layer. Over the last few years, many database intrusion detection systems are developed using anomaly method like mining data dependencies among data items, access pattern etc. In this paper we have used signature based approach, which is defined on role hierarchy. Roles classify the user and makes management easy. We have worked on valid transaction sequences which are stored in profile table. This approach takes care of privilege right checking at attribute level.
Published in: 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC)
Date of Conference: 22-24 December 2016
Date Added to IEEE Xplore: 26 June 2017
ISBN Information: