Sciweavers

68 search results - page 3 / 14
» Intrusion Detection in RBAC-administered Databases
Sort
View
ACMSE
2006
ACM
13 years 11 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
HAIS
2008
Springer
13 years 6 months ago
Classification Agent-Based Techniques for Detecting Intrusions in Databases
This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reaso...
Cristian Pinzón, Yanira de Paz, Rosa Cano
GLOBECOM
2007
IEEE
14 years 3 days ago
A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System
Abstract—Network Intrusion Detection and Prevention Systems (NIDPSs) are vital in the fight against network intrusions. NIDPSs search for certain malicious content in network tr...
N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jo...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 5 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
INFOSCALE
2007
ACM
13 years 7 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü