Implementing Log Based Security in Data Warehouse
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 8)Publication Date: 2013-03-25
Authors : Amritpal Singh Nitin Umesh;
Page : 254-258
Keywords : Data Warehousing; Data Masking; Intrusion Detection; Data Encryption; Data Security;
Abstract
This paper proposes an implementation of behaviour analysis based on logs. To ensure data privacy various solutions have been proposed and proven effective in their security purpose. However they introduce large overheads making them unfeasible for data warehouse. Therefore to avoid these overheads and to increase data security, data masking approach have been proposed. Solution manages the randomness of masked values which increases the overall security strength. Log Analysis for intrusion detection is the process use to detect attacks on a specific envir onment using logs as the primary source of information. For future perspectives it will be beneficial as we will come to know whether it is simple access or attack. So by analysing the behaviour of user we can overcome attacks.
Other Latest Articles
- Semi-Automatic Mapping Generation for the DBpedia Information Extraction Framework
- Research on Qualitative Analysis of LEACH with Wormhole attack in Wireless Sensor Network
- Effect of Blur and Noise on Image Denoising based on PDE
- A Piecewise Linear Approximation Method to Solve Fuzzy Separable Quadratic Programming Problem
- A Survey on Different Approaches for Energy Conservation in Wireless Sensor Networks
Last modified: 2013-04-02 19:53:50