Published by LAP LAMBERT Academic Publishing Apr 2017, 2017
ISBN 10: 3330079010 ISBN 13: 9783330079014
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 32.08
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the resultsBooks on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Englisch.
Published by LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330079010 ISBN 13: 9783330079014
Language: English
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 64 pages. 8.66x5.91x0.15 inches. In Stock.
Published by LAP LAMBERT Academic Publishing Apr 2017, 2017
ISBN 10: 3330079010 ISBN 13: 9783330079014
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
£ 32.08
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results 64 pp. Englisch.
Published by LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330079010 ISBN 13: 9783330079014
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 32.08
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results.
Published by LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330079010 ISBN 13: 9783330079014
Language: English
Seller: moluna, Greven, Germany
£ 27.95
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Yadav Jay Kant Pratap SinghJay Kant Pratap Singh Yadav Completed his B.Tech(Computer Science & Engineering), M.Tech (Computer Engineering) from Sardar Vallabhbhai National Institute of Technology,Surat(India). He has about 13 years t.