Intrusion detection in database systems

7Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Javidi, M. M., Sohrabi, M., & Rafsanjani, M. K. (2010). Intrusion detection in database systems. In Communications in Computer and Information Science (Vol. 120 CCIS, pp. 93–101). https://doi.org/10.1007/978-3-642-17604-3_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free