IJCTT-International Journal of Computer Trends and Technology
In many organizations, Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depend on Database Security, i.e. Insider attack detection. In this paper, mainly three insider attack detection techniques introduced are as follows Log examining, Query clustering & Policy-based mechanism. In Log examining approach given transaction of each user should be examined or tested for insider attack. In Query clustering approach external query (outlier) i.e. other than a cluster of query, should be detected. In policy-based mechanism, each user having its own policy data & if any policy violated, then it should be detected as an insider attack.