Database Response Policies To Support Intrusion Response System for DBMS
The intrusion response system is responsible for issuing a suitable response to an anomalous request. The interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues are address in context of such response policies are that of policy matching and policy administration. For the policy matching problem, the two algorithms that efficiently search the policy database for policies that match an anomalous request. The other issue that the address is that of administration of response policies to prevent malicious modifications to policy objects from legitimate users.