Intrusion Detection and Containment in Database Systems
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
23-10-2009, 04:08 PM

many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The ISDs work for early detection of attacks and make the recovery of lost or damaged data simpler. Many researchers are working on increasing the intrusion detection efficiency and accuracy. But most of these efforts are to detect the intrusions at network or operating system level. They are not capable of detecting corruption data due to malicious transactions in databases. We will discuss different ways of detecting the malicious transactions and ways to recover the data from those malicious transactions. Mainly we will see the data mining solution proposed by Yi Hu et al for database intrusion detection and solution by Paul Ammann et al for recovery from the malicious transactions
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: intrusion detection and containtment in database system ppt, ppt for database intrusion detection system on project level, intrusion detection in database systems, intrusion detection system database project, free download project detection of malicious transaction in dbms, intrusion detection in database systems ppt, intrusion detection,
Popular Searches: types of intrusion detection systems ppt, defect containment, intrusion detection in database systems, intrusion detection and, defect containment ppt, intrusion detection systems dod, intrusion detection expert systems,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Database management concepts seminar tips 9 3,747 23-07-2016, 02:17 PM
Last Post: Dhanabhagya
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,351 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,222 16-07-2015, 09:21 PM
Last Post: Guest
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,770 13-04-2015, 05:21 PM
Last Post: shilpavpius
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  wireless video service in cdma systems wikipedia jaseelati 0 359 13-01-2015, 04:29 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 265 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati
  credit card fraud detection ppt jaseelati 0 177 27-12-2014, 01:11 PM
Last Post: jaseelati
Lightbulb Fraud detection system for card transactions ffffff123456 0 377 26-04-2014, 05:19 AM
Last Post: ffffff123456