Anomaly detection in RDBMS

Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows interest in database activity monitoring and anomaly detection .Once an anomalous request is found suitable response scheme is needed to respond. Then once a request is found there are three response actions involved .Those are conservative, fine grained and aggressive response actions. The main problem is issuing suitable response to the detected anomalous request. In this paper, two issues Policy matching and policy administration are addressed and to overcome the problems caused due to anomalous request.

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Topic: Security Date Added: May 2013 Format: PDF

Find By Topic