Learn More
Two main approaches for network intrusion detection are <i>misuse detection</i> [6] and <i>anomaly detection</i> [11]. The limitation of the misuse approach is that cannot effectively detect new patterns of intrusions that are not precisely encoded in the system [11]. The anomaly detection approach usually produces a large number of false alarms [1, 7]. In(More)
As the database environment changing, database is no longer accessed only by using SQL to communicate with DBMS as in the two-tier client-server architecture. In modern enterprise distributed systems, applications are developed and deployed as components in n-tier architecture. Database system is integrated with related applications and can only be accessed(More)
  • 1