Intrusion Detection and Containment in Database Systems
#1

[attachment=128]
[attachment=129]
many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The ISDs work for early detection of attacks and make the recovery of lost or damaged data simpler. Many researchers are working on increasing the intrusion detection efficiency and accuracy. But most of these efforts are to detect the intrusions at network or operating system level. They are not capable of detecting corruption data due to malicious transactions in databases. We will discuss different ways of detecting the malicious transactions and ways to recover the data from those malicious transactions. Mainly we will see the data mining solution proposed by Yi Hu et al for database intrusion detection and solution by Paul Ammann et al for recovery from the malicious transactions
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: intrusion detection systems group, spill containment, intrusion detection and protection, intrusion detection systems government, intrusion systems, project venona containment, intrusion detection systems comparison ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 30,652 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,374 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,073 15-04-2016, 08:04 PM
Last Post: knagpur
  Human Robot Interaction in Multi-Agent Systems pdf computer topic 0 1,202 25-03-2014, 09:43 PM
Last Post: computer topic
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,345 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,739 01-03-2013, 11:58 AM
Last Post: [email protected]
  Evolution of Embedded Systems(Downlaod Seminar Report) Computer Science Clay 2 3,277 14-12-2012, 02:09 PM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,118 29-11-2012, 12:56 PM
Last Post: seminar details
  Integration Of Data mining And Data warehousing Systems computer science topics 1 3,255 29-11-2012, 12:56 PM
Last Post: seminar details

Forum Jump: