Intrusion Detection and Containment in Database Systems
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
23-10-2009, 04:08 PM


[attachment=128]
[attachment=129]
many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The ISDs work for early detection of attacks and make the recovery of lost or damaged data simpler. Many researchers are working on increasing the intrusion detection efficiency and accuracy. But most of these efforts are to detect the intrusions at network or operating system level. They are not capable of detecting corruption data due to malicious transactions in databases. We will discuss different ways of detecting the malicious transactions and ways to recover the data from those malicious transactions. Mainly we will see the data mining solution proposed by Yi Hu et al for database intrusion detection and solution by Paul Ammann et al for recovery from the malicious transactions
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Database management concepts seminar tips 9 3,818 23-07-2016, 02:17 PM
Last Post: Dhanabhagya
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,399 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,805 13-04-2015, 05:21 PM
Last Post: shilpavpius
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  wireless video service in cdma systems wikipedia jaseelati 0 385 13-01-2015, 04:29 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 295 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati
  credit card fraud detection ppt jaseelati 0 196 27-12-2014, 01:11 PM
Last Post: jaseelati
Lightbulb Fraud detection system for card transactions ffffff123456 0 395 26-04-2014, 05:19 AM
Last Post: ffffff123456