An Effective Study on Database Intrusion Using Log Mining

Authors

  • Pooja Prasad Department Of Computer Engineering, SIT College of Engg., Lonawala, Pune
  • Reshma Charbhe Department Of Computer Engineering, SIT College of Engg., Lonawala, Pune
  • Dinesh More Department Of Computer Engineering, SIT College of Engg., Lonawala, Pune
  • Prof. S. G. Shaikh Department Of Computer Engineering, SIT College of Engg., Lonawala, Pune

Keywords:

Data mining, Insider attack, Intrusion detection and protection, System call (SC), Users’ behaviors

Abstract

In database system because of insider misuse there is dangerous excruciating security problem. But today’s
scenario, more focus is given to external attacks because it is more visible, so some present technology are Intrusion
Detection System(IDS) mechanism with Role based Access Control (RBAC). In this methodology permission are
associated with roles and then intruder who is holding a specific role and system, efficiently determine role intruder but
problem with it is that for extending Role base access proper planning is crucial and also effective when roles are
carefully design. Next Technique is IDS using data mining. In which algorithm is develop for finding dependencies
among the important item in Relational Database System (RDBMS), any transaction which does not follow dependencies
are indentified as malicious, it also identify modification of sensitive attribute efficiently but disadvantage is that the high
sensitivity attributes are usually access less frequently. There may not be any rule for such attribute. So, to overcome this
flaws this paper intrudes idea of Log mining using intruder detection using comparative analysis We model users access
patterns by profiling to keep track of users’ usage habits as their forensic features and determines whether a valid login
user to system or not.

Published

2016-03-25

How to Cite

An Effective Study on Database Intrusion Using Log Mining. (2016). International Journal of Advance Engineering and Research Development (IJAERD), 3(3), 29-32. https://ijaerd.org/index.php/IJAERD/article/view/1206

Similar Articles

1-10 of 3630

You may also start an advanced similarity search for this article.