Database Intrusion Detection Using Role Based Access Control System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
In this paper, we propose a different approach for the database intrusion detection (IDS). Database Management (DBMS) has become a key criteria in the information system (IS) storing valuable information of the system. We are urged to protect it to the fullest without losing any bit of information. Intrusion detection, which gathers and analyses the information system was one of the methods which protects the database the fullest with all sorts of rules. In this paper, we move into the Role based Access Control (RBAC) system which controls the administered databases for finding out sensitive attributes of the system dynamically. Role based Access Control is a method to restrict system access by authorized and unauthorized people directly. The access is based on the roles of the individual users within the organization. Important roles like administrator, access sensitive attributes and if their audit logs are mined, then some useful information regarding the attributes can be used. This will help to decide the sensitivity of the attributes. Since the models of the database intrusion detection has proposed a lot of rules , it is time to change the system to protect it more evidently with less rules and regulations which would be useful for detecting all sorts of transactions.
Authors and Affiliations
Mrs. Antony Vigil, Mrinalini Shridhar, R Oviya
Induction Motor Fed By Γ Z- Source Inverter
The main focus is on the losses that occur in an Induction motor and to select a suitable Inverter that feeds the Induction motor. Various analysis are performed on the different types of Inverters and on completion of...
Network Connectivity Optimization for Device-to-Device Wireless System with Femto Cells
The demand for high data rate transmission has triggered the design and development of advanced cellular networks, such as 4th generation long term evolution (LTE) networks. However, their poor coverage and relatively h...
Study and Determination of Pedestrian Level of Service & Pedestrian Flow Parameters for a Busy Street in Anand City
There are many modes of transport Starting from Walking to the Multi Axle Vehicles. But, From the Modal Split study carried out by various authors says that, amongst all the various modes the traffic load shares by the...
slugWi-Fi Direct in Android Using Peer to Peer Communication
Open Handset Alliance (OHA) a confederation of 50 Telecoms, mobile hardware, and software companies, headed by Google, were found on 5th of November, 2007 and unveiled a new platform that is called Android. At present...
- Splitting Graphs
Let G(V,E) be a graph. A dominating set is a subset S of V such that every vertex not in S is adjacent to at least one vertex in S. The cardinality of a minimum dominating set is called the domination number, (G). A do...