CISUC

Detection of malicious transactions in DBMS

Authors

Subject

Instrusion Detection in DBMS

Conference

The 11th IEEE International Symposium Pacific Rim Dependable Computing, PRDC2005, December 2005


Cited by

Year 2013 : 2 citations

 Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013.

 Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement withSemantic Analysis", International Journal of Advancements in Computing Technology (IJACT), Vol. 5 No 1, January 2013.

Year 2012 : 2 citations

 Y. A. Rathod, M. B. Chaudhari, G. B. Jethava, "Database intrusion detection by transaction signature", Third International Conference on Computing Communication & Networking Technologies, ICCCNT 2012, Tamilnadu, India, July 26-28, 2012.

 1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012.

Year 2011 : 2 citations

 1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011.

 2. Udai Pratap Rao, Dhiren R. Patel, "Database Security Architecture for Detection of Malicious Transactions in Database", The 2011 International Conference on Security & Management, SAM 2011, Las Vegas Nevada, USA, July 2011.

Year 2010 : 7 citations

 Dai Hua,Qin Xiaolin?Bai Chuanjie, "AMalicious Transaction Detection Method Based on Transaction Template", Journal of computer research and development, 47(5), 2010.

 Chen Changqing, Liu Xiaofeng, Liu Yunsheng, Pei Xiaobing, Zhou Heng, "Architectures for Intrusion Tolerant Real-Time Database System", Journal of Computer Research and Development, 47 (Suppl), 2010.

 Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh Bastani, "Cloud Storage Design Based on Hybrid of Replication and Data Partitioning", 2010 IEEE 16th International Conference on Parallel and Distributed Systems, ICPADS 2010, Shangai, China, December 2010.

 Yunqi Ye, Liangliang Xiao, I-Ling Yen, F. Bastani, "Secure, Dependable, and High Performance Cloud Storage", 2010 29th IEEE Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, India, November 2010.

 Udai Pratap Rao, G. J. Sahani, Dhiren R. Patel, “Machine Learning Proposed Approach for Detecting Database Intrusions in RBAC Enabled Databases”, Second International Conference on Computing, Communication and Networking Technologies, ICCCNT10, Karur, Tamilnadu, India, July 2010.

 Udai Pratap Rao,G. J. Sahani, Dhiren R. Patel, “Clustering Based Machine Learning Approach for Detecting Database Intrusions in RBAC Enabled Databases”, International Journal of Computer and Network Security, IJCNS, Vol.2, No.6, June 2010.

 Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi, "An access control model for web databases", 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, DBSec'10, Rome, Italy, June 2010.

Year 2009 : 2 citations

 Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li, "Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation", Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009 (in conjunction with ICEIS 2009), Milan, Italy, May 2009.

 1. Himanshu Gahlaut, “Prevention of Malicious Transactions in Database Management Systems”, BSc Thesis, Department of Computer Science and Engineering – National Institute of Technology, Rourkela, India, May 2009.

Year 2008 : 1 citations

 CAI Min, YE Zhen, "Design of a model of database intrusion detection", Journal Of Hefei University Of Technology (Natural Science), 31(4), 2008.

Year 2007 : 2 citations

 Clay Brockman, "Why Monitoring Database Application Behavior is the Best Database Intrusion Detection Method", Position Paper - ITK 478: Fall 2007, Illinois State University, 2007.

 1. Jinfu Chen, Yansheng Lu, Xiaodong Xie, “An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions”, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, September 2007.