2020
DOI: 10.37624/ijert/13.6.2020.1173-1178
|View full text |Cite
|
Sign up to set email alerts
|

Database Intrusion Detection using Role and User Level Sequential Pattern Mining and Fuzzy Clustering

Abstract: Majority of the present-day organizations store and use data on large scale for their functioning. Often this data is private and essential, and unauthorized access to the data can have serious financial and legal repercussions. While it is easier to capture malicious activities perpetrated by an external agent, it is relatively harder to detect transactions committed by company employee with some malicious intent. This is due to the awareness of the employee about the company database structure along with the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…In that case, it generates an alert or takes immediate action to prevent further damage and secure the system [25]. An IDPS can also detect and prevent anomalous behavior not covered by known attack signatures [26].…”
Section: Introductionmentioning
confidence: 99%
“…In that case, it generates an alert or takes immediate action to prevent further damage and secure the system [25]. An IDPS can also detect and prevent anomalous behavior not covered by known attack signatures [26].…”
Section: Introductionmentioning
confidence: 99%