Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Jay Kant Pratap Singh Yadav Completed his B.Tech(Computer Science & Engineering), M.Tech (Computer Engineering) from Sardar Vallabhbhai National Institute of Technology,Surat(India). He has about 13 years teaching experience in various technical colleges of india. His research interest is in Machine Learning,Soft Computing,Data Mining .
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results 64 pp. Englisch. N° de réf. du vendeur 9783330079014
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Yadav Jay Kant Pratap SinghJay Kant Pratap Singh Yadav Completed his B.Tech(Computer Science & Engineering), M.Tech (Computer Engineering) from Sardar Vallabhbhai National Institute of Technology,Surat(India). He has about 13 years t. N° de réf. du vendeur 151236808
Quantité disponible : Plus de 20 disponibles
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 64 pages. 8.66x5.91x0.15 inches. In Stock. N° de réf. du vendeur __3330079010
Quantité disponible : 1 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the resultsVDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 64 pp. Englisch. N° de réf. du vendeur 9783330079014
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results. N° de réf. du vendeur 9783330079014
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Implementation of Database intrusion Detection | Jay Kant Pratap Singh Yadav | Taschenbuch | 64 S. | Englisch | 2017 | LAP LAMBERT Academic Publishing | EAN 9783330079014 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de réf. du vendeur 109097627
Quantité disponible : 5 disponible(s)