Download now Free registration required
In many organizations Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depends on Database Security i.e. Insider attack detection. In this paper mainly insider attack detection technique is studied which is based on user policy. Each user has its own profile data, from that profile data, user wants to activate their policy, but it must be permitted by at least k-DBAs. Other hand any policy modifications are done by any legitimate user, without administration of that policy, then it should be detected as malicious modification done by legitimate user. Once malicious modifications are detected then as per response action database, action should be taken against those DBAs.
- Format: PDF
- Size: 508.6 KB