Free delivery for purchases over 1 299 Kč
PPL Parcel Shop 54 Czech Post 74 Balíkovna 49 GLS point 54 Zásilkovna 44 GLS courier 74 PPL courier 99

Implementation of Database intrusion Detection

Language EnglishEnglish
Book Paperback
Book Implementation of Database intrusion Detection Jay Kant Pratap Singh Yadav
Libristo code: 16367516
Publishers LAP Lambert Academic Publishing, May 2017
Here, we propose data mining approach for database intrusion detection. In each database, there are... Full description
? points 86 b
861 včetně DPH
In stock at our supplier Shipping in 9-11 days

30-day return policy


You might also be interested in


Death Makes the News Jessica M. Fishman / Paperback
common.buy 970
Functioning of a Buddha's Mind Prime Dhar Prime Dharma Master Kyongsan / Paperback
common.buy 1 056
Here Before (EP) Postcards / Audio CD
common.buy 278
Father Spyros: The Corfu Mystery Maurice Price / Paperback
common.buy 166
Size Zero VICTOIRE DAUXERRE / Hardback
common.buy 712
Lehrbuch der Chirurgie und Operationslehre Eduard Albert / Hardback
common.buy 2 081
1997 Richard Power Sayeed / Paperback
common.buy 464
Portslade Memories Judy Middleton / Paperback
common.buy 402

Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results

About the book

Full name Implementation of Database intrusion Detection
Language English
Binding Book - Paperback
Date of issue 2017
Number of pages 64
EAN 9783330079014
ISBN 3330079010
Libristo code 16367516
Weight 112
Dimensions 150 x 220 x 4
Give this book today
It's easy
1 Add to cart and choose Deliver as present at the checkout 2 We'll send you a voucher 3 The book will arrive at the recipient's address

Login

Log in to your account. Don't have a Libristo account? Create one now!

 
mandatory
mandatory

Don’t have an account? Discover the benefits of having a Libristo account!

With a Libristo account, you'll have everything under control.

Create a Libristo account