Corpus ID: 53312574

Intrusion Detection and Data Recovery using Log Mining

@inproceedings{Kate2015IntrusionDA,
  title={Intrusion Detection and Data Recovery using Log Mining},
  author={Sanyukta Kate and Mitali Tarkar and Bhavana Kathwate and M. Pathare and S. Kulkarni},
  year={2015}
}
  • Sanyukta Kate, Mitali Tarkar, +2 authors S. Kulkarni
  • Published 2015
  • Number of resources are invested by organizations in securing information from intruders. In case of an intrusion, without a reliable data recovery system the company will face losses. The existing technologies only detect anomalous behaviors in databases created by users. However, conventional security mechanisms are not designed to recover the original information that has been altered. This paper shows an approach to detect an intrusion and also provides a novel solution for recovery of data… CONTINUE READING

    Figures from this paper

    References

    SHOWING 1-4 OF 4 REFERENCES
    Database Intrusion Detection using Weighted Sequence Mining
    • 82
    • PDF
    DEMIDS: A Misuse Detection System for Database Systems
    • 218
    • PDF
    CANDID: preventing sql injection attacks using dynamic candidate evaluations
    • 171
    • PDF
    A misuse detection system for database systems
    • 1991