Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Javidi, M. M., Sohrabi, M., & Rafsanjani, M. K. (2010). Intrusion detection in database systems. In Communications in Computer and Information Science (Vol. 120 CCIS, pp. 93–101). https://doi.org/10.1007/978-3-642-17604-3_10
Mendeley helps you to discover research relevant for your work.