USING METADATA IN FILTERED LOGS FOR PREVENTION OF DATABASE INTRUSION THROUGH OWNER LEVEL INTERACTION
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)Publication Date: 2014-12-29
Authors : NAYANA SANTHOSH; SACHU.P.SAHI; ARUN R;
Page : 88-93
Keywords : computer engineering; cloud computing; network security; wireless communication; iaeme journals; IJCET; journal article; research paper; open access journals; journal publication;
Abstract
As the online activities increases, the chance for attacks also increases in a rapid manner. Among the different categories of attacks, database attacks are most popular, since the data residing on it are highly confidential. One of the main obstacles that we face while conducting forensics analysis is the huge amount of data that we need to analyze in which the required amount of information will be very less and the lack of evidence regarding the intrusion. So in this paper, we focus on a method to filter the bulk amount of log data using a reduction algorithm based on frequent attribute values. Then using metadata, evidence regarding the intrusion is retrieved and notifies the database user about the attempt to mitigate its effect by reversing the act ion performed by the intruder.
Other Latest Articles
- SECURITY IN MANET VIA DIFFERENT INTRUSION DETECTION TECHNIQUES
- CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES
- AN ENERGY EFFICIENT PROTOCOL BASED STUDY OF WSN TO INCREASE THE LIFETIME
- HUMAN ACTIVITY DETECTION BASED ON EDGE POINT MOVEMENTS AND SPATIO-TEMPORAL FEATURES IN INDOOR
- INVESTIGATIVE ANALYSIS OF SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AND THEIR COUNTER MEASURES
Last modified: 2016-08-09 15:11:42