24-06-2014, 01:54 PM
DESIGN AND IMPLEMENTATION OF AN INTLOSION RESPONSE SYSTEM FOR RELATIONAL DATABASE
A PROJECT ON.pptx (Size: 32.51 KB / Downloads: 11)
INTRODUCTION
Prevent data theft fro both inside and outside organization has become major challange
Standard database security mechanisms
Access control
Authentication
Encryption
Not much help from inside attackers
MODULES
Anomaly detection
Respecse to attack
ANOMALY DETECTION
Construction of database access profites of role and users,and on the use of such profites for the attacks
User request that does not conform to the normal access is said as anomalyus
Main issue for protecting respecse policy from inside threats and provide legitimate access rights to the policy object
RESPECSE TO ATTACK
Charge of takeng some action ones an anomaly is detected
There are three main types of response action
Low
Medium
High