Download Now Free registration required
Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows interest in database activity monitoring and anomaly detection .Once an anomalous request is found suitable response scheme is needed to respond. Then once a request is found there are three response actions involved .Those are conservative, fine grained and aggressive response actions. The main problem is issuing suitable response to the detected anomalous request. In this paper, two issues Policy matching and policy administration are addressed and to overcome the problems caused due to anomalous request.
- Format: PDF
- Size: 639.8 KB