To Find Malicious Transaction in Database
Management System by Log Mining Approach
Journal:
GRENZE International Journal of Engineering and Technology
Authors:
Apashabi Chandkhan Pathan
Volume:
6
Issue:
2
Grenze ID:
01.GIJET.6.2.503_3
Pages:
220-226
Abstract
The procedure of outcome correlations within the relational databases is
data processing . There are diverse techniques for recognizing spiteful database
transactions in management organism. There are several surviving methods which
profile is SQL query structures and database user activities to noticing intrusions, the log
mining approach is that the automatic discovery for identifying inconsistent
database transactions. data processing is extremely helpful to finish users for
extracting useful business information from large database. Multi-level and multidimensional
data processing are employed to get data item dependency rules, data
sequence rules, domain dependency rules, and domain sequence rules from the
database log covering legitimate transactions. Database transactions that
don't suits the principles are identified as malicious transactions. The log mining approach
are able to do desired true and false positive rates when the arrogance and support
are found out appropriately. The implemented system is incrementally maintain the
info dependency rule sets also as optimize the enactment of the intrusion detection process.