2008 International Symposium on Information Technology 2008
DOI: 10.1109/itsim.2008.4631942
|View full text |Cite
|
Sign up to set email alerts
|

System architecture for SQL injection and insider misuse detection system for DBMS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…The effectiveness of detection largely depends on the accuracy of the learning algorithms. The approach in [34] focuses on securing the web application from external and internal attacks. SQL Injection and Insider Misuse Detection System (SIIMDS) is a technique that takes advantage of both misuse detection methods and anomaly detection methods to reduce the risk resulting from SQL injection attack.…”
Section: Related Workmentioning
confidence: 99%
“…The effectiveness of detection largely depends on the accuracy of the learning algorithms. The approach in [34] focuses on securing the web application from external and internal attacks. SQL Injection and Insider Misuse Detection System (SIIMDS) is a technique that takes advantage of both misuse detection methods and anomaly detection methods to reduce the risk resulting from SQL injection attack.…”
Section: Related Workmentioning
confidence: 99%
“…Fig 1 shows some critical areas need to be considered in Database Security [5] and how different researcher use different techniques and methods to mitigate these risks. www.ijacsa.thesai.org Used for both insider and outsider attacks [20] Auditing Method Used for both insider and outsider attacks [24,27] Hackers exploit these critical areas and security holes in a database application to gain database administrator (DBA) level grants and privileges to access sensitive data and cause a denial of service (DOS) attacks. Following are the security threats that need attention [10].…”
Section: A Self-protection In Dbmsmentioning
confidence: 99%
“…[ [20] Discuss database security threats against both internal and external threats. Proposed SIIMDS to detect both internal and external attacks.…”
Section: Both For Inside and Outside Attacksmentioning
confidence: 99%
“…Threat in database is defined by Aziah Asmawi in [5] as a set of policies, measures and mechanisms to provide safety, availability and integrity of data and to combat possible attacks on the system from outsiders as well as insiders, both accidental and malicious. Aziah Asmawi has mentioned about SQL injection which can be executed by two ways by unauthorized user accessing the database via webpage connected network:…”
Section: About the Threats In Database Management System (Tdbms)mentioning
confidence: 99%
“…The second security issue of database management systems has various fields of database integrity as described in [5]:…”
Section: Jajodia-dogan Security Modelmentioning
confidence: 99%