Date Added: Mar 2012
A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for different conditions. The main issues considered to be are that of policy management, signature generation and pattern matching. An algorithm is proposed to efficiently search the policy database, if an anomalous request matches with the policies and also extend the postgreSQL database base management system with the policy management. The results show that the techniques are very efficient and report experimental results.