INTRODUCTION The security goals of a computer system can be specified explicitly by security policies - what actions a subject can or cannot perform on objects under specified conditions. The security policies are enforced by security mechanisms. Compromising the security mechanisms is intrusion whereas violating the security policies without compromising the security mechanisms by legitimate users is insider abuse. Misuse includes both intrusion and insider abuse. Misuse can been handled by signature based and anomaly based approaches [CFMS95]. In signature based detection, audit logs are matched against a database of known attack patterns. In anomaly based detection, it is assumed that the set of intrusive and misuse events equals the ...
The decrease in the costs of storage devices and the advances in data warehousing advocate a new are...
Information is valuable asset of any organization which is stored in databases. Data in such databas...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
Database management systems (DBMS) are a key component in the information infrastructure of most org...
In this paper, we propose database intrusion detection mechanism to enhance the security of DBMS. In...
Intrusion detection is difficult to accomplish when attempting to employ current methodologies when ...
Data represent today a valuable asset for companies and organizations and must be protected. Most of...
The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Tim...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
Insider attack is formsthe biggest threat against database management systems. Although many mechani...
The intrusion response component of an overall intrusion detection system is responsible for issuing...
Database is a critical component of today’s Web applications. Web applications permit users to remot...
Countering threats to an organization\u27s internal databases from database applications is an impor...
The decrease in the costs of storage devices and the advances in data warehousing advocate a new are...
Information is valuable asset of any organization which is stored in databases. Data in such databas...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
Database management systems (DBMS) are a key component in the information infrastructure of most org...
In this paper, we propose database intrusion detection mechanism to enhance the security of DBMS. In...
Intrusion detection is difficult to accomplish when attempting to employ current methodologies when ...
Data represent today a valuable asset for companies and organizations and must be protected. Most of...
The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Tim...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
Insider attack is formsthe biggest threat against database management systems. Although many mechani...
The intrusion response component of an overall intrusion detection system is responsible for issuing...
Database is a critical component of today’s Web applications. Web applications permit users to remot...
Countering threats to an organization\u27s internal databases from database applications is an impor...
The decrease in the costs of storage devices and the advances in data warehousing advocate a new are...
Information is valuable asset of any organization which is stored in databases. Data in such databas...
AbstractMost of valuable information resources for any organization are stored in the database; it i...