Intrusion detection and containments in database system seminar presentation
There are various methods to protect the data and the network from the attackers or the hackers. Inspite enough care is taken to protect the data, we can say that the data is still not secure and is under the risk of being hacked. One way to protect the data from being attacked is to make use of intrusion detection system which identifies the attack early and recovers the lost or the damaged data in a simpler way.
If any data is corrupted then it can spread across the entire database and damage all the other data and therefore such risk on the database should be identified quickly using IDS. If the data is not recovered as early as possible then recovering the data becomes very tedious.
Researchers are working on data mining approach to make the IDS accurate and efficient. The data mining approach for intrusion detection in database system was found by Yi hu and Brajendra panda. In data mining approach, the dependencies of all the available data in the database system is determined.