To Find Malicious Transaction in Database Management System by Log Mining Approach

Journal: GRENZE International Journal of Engineering and Technology
Authors: Apashabi Chandkhan Pathan
Volume: 6 Issue: 2
Grenze ID: 01.GIJET.6.2.503_3 Pages: 220-226

Abstract

The procedure of outcome correlations within the relational databases is data processing . There are diverse techniques for recognizing spiteful database transactions in management organism. There are several surviving methods which profile is SQL query structures and database user activities to noticing intrusions, the log mining approach is that the automatic discovery for identifying inconsistent database transactions. data processing is extremely helpful to finish users for extracting useful business information from large database. Multi-level and multidimensional data processing are employed to get data item dependency rules, data sequence rules, domain dependency rules, and domain sequence rules from the database log covering legitimate transactions. Database transactions that don't suits the principles are identified as malicious transactions. The log mining approach are able to do desired true and false positive rates when the arrogance and support are found out appropriately. The implemented system is incrementally maintain the info dependency rule sets also as optimize the enactment of the intrusion detection process.

Download Now << BACK

GIJET