ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Database Tampering Monitoring System to Enhance Security

Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.6, No. 12)

Publication Date:

Authors : ;

Page : 358-360

Keywords : Anomaly detection; virtualization; multi-tier web application; data leakage detection;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In today's era, internet has become essential part of our lifestyle . It is used for banking , social media , online shopping etc. but like anything else even internet has its vulnerabilities and soft corners .Online stores majorly depends on data stored in their respective databases . These databases can be tampered with using dedicated tools and techniques. Once attacker has access to data in database ,the attacker can tamper the data and create havoc. There are tools and techniques present which provide Intrusion detection through monitoring sessions by users, and inform about breach in the network and tamper in the database. This paper focuses on encapsulating all the techniques under single platform by using Intrusion detection, Hashing algorithms and finding the data leakage and tampered database preventing various attacks and unauthorized access to the data.

Last modified: 2017-12-15 18:32:37