Survey on Database Tampering Monitoring System to Enhance Security
Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.6, No. 12)Publication Date: 2017-12-01
Authors : Anmol Bava Jayesh Gehlot Saurabh Banwaskar Asif Shaikh Nivedita Kadam;
Page : 358-360
Keywords : Anomaly detection; virtualization; multi-tier web application; data leakage detection;
Abstract
In today's era, internet has become essential part of our lifestyle . It is used for banking , social media , online shopping etc. but like anything else even internet has its vulnerabilities and soft corners .Online stores majorly depends on data stored in their respective databases . These databases can be tampered with using dedicated tools and techniques. Once attacker has access to data in database ,the attacker can tamper the data and create havoc. There are tools and techniques present which provide Intrusion detection through monitoring sessions by users, and inform about breach in the network and tamper in the database. This paper focuses on encapsulating all the techniques under single platform by using Intrusion detection, Hashing algorithms and finding the data leakage and tampered database preventing various attacks and unauthorized access to the data.
Other Latest Articles
- Theoretical and Numerical Analysis of Sloshing Effect on Ballast Submarine
- Clinical and Laboratory Characteristic of Acute Stenosic Laryngotraceitis in Children Hospitalized into Diagnostic Department of Lviv Regional Hospital of Infectious Diseases during the year 2013
- An Automated Soil and Climatic Conditions Controlling Greenhouse: A Preliminary Study
- Carbohydrate Determinants of Chorionic Villi Glycoconjugates of Human Embryos, Lost due to Sporadic and Recurrent Miscarriages
Last modified: 2017-12-15 18:32:37