Database Intrusion Detection Using Role Based Access Control System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
In this paper, we propose a different approach for the database intrusion detection (IDS). Database Management (DBMS) has become a key criteria in the information system (IS) storing valuable information of the system. We are urged to protect it to the fullest without losing any bit of information. Intrusion detection, which gathers and analyses the information system was one of the methods which protects the database the fullest with all sorts of rules. In this paper, we move into the Role based Access Control (RBAC) system which controls the administered databases for finding out sensitive attributes of the system dynamically. Role based Access Control is a method to restrict system access by authorized and unauthorized people directly. The access is based on the roles of the individual users within the organization. Important roles like administrator, access sensitive attributes and if their audit logs are mined, then some useful information regarding the attributes can be used. This will help to decide the sensitivity of the attributes. Since the models of the database intrusion detection has proposed a lot of rules , it is time to change the system to protect it more evidently with less rules and regulations which would be useful for detecting all sorts of transactions.
Authors and Affiliations
Mrs. Antony Vigil, Mrinalini Shridhar, R Oviya
Cholesterol Content and Free Fatty Acids in Edible Oils and Health Effects: A review
Cholesterol plays a major role in human heart health and high cholesterol is a leading risk factor for human cardiovascular diseases such as coronary heart disease and stroke. Not only cholesterol content but also chole...
A Study on Review of Literature of Asymmetrical Building with Bracings
n emerging demand for earthquake resistant structure provokes new trends in seismic analysis. In present days a new challenge of constructing asymmetrical building has higher thirst compared with symmetrical buildings....
Enhanced Approach for Resemblance of User Profiles in Social Networks using Similarity Measures
The momentum of Online Social Networking, allows the users to build up the connections with other users of the internet. In order to search the people having similar interests, for a variety of reasons either to persona...
A Three Way Visual Cryptography & its Application in biometric Security : A Review
Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image...
A Comprehensive Study on Data Warehouse, OLAP and OLTP Technology
Data warehouse is an integrated, subject oriented, time variant and non-volatile collection of data used for decision making. It is a type of database for decision making which is separately maintained from the operatio...