Abstract | ||
---|---|---|
Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-17604-3_10 | Communications in Computer and Information Science |
Keywords | Field | DocType |
Database systems,Intrusion Detection System (IDS),Transaction | Permission,Host-based intrusion detection system,Computer science,Computer security,Anomaly-based intrusion detection system,Safeguard,Insider,Database transaction,Intrusion detection system,Database,Computer security model | Conference |
Volume | ISSN | Citations |
120 | 1865-0929 | 1 |
PageRank | References | Authors |
0.35 | 8 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohammad M. Javidi | 1 | 71 | 12.98 |
Mina Sohrabi | 2 | 4 | 1.06 |
Marjan Kuchaki Rafsanjani | 3 | 76 | 16.18 |