System architecture for SQL injection and insider misuse detection system for DBMS

  title={System architecture for SQL injection and insider misuse detection system for DBMS},
  author={Aziah Asmawi and Zailani Mohamed Sidek and Shukor Abd Razak},
  journal={2008 International Symposium on Information Technology},
As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world… CONTINUE READING
10 Citations
18 References
Similar Papers


Publications referenced by this paper.
Showing 1-10 of 18 references

Sql injection: Are your web applications vulnerable? Available at URL er.pdf

  • K. Spett
  • 2005
Highly Influential
6 Excerpts

CSI/FBI Computer Crime and Security Survey

  • R. Power
  • Computer Security Issues & Trends
  • 2002
1 Excerpt

Guesswork Plagues Web Hole Reporting

  • K. Poulsen
  • URL
  • 2002
1 Excerpt

Survey: Costs of computer security breaches soar

  • T. Hatcher
  • Available at URL…
  • 2001
1 Excerpt

The truth about internet fraud

  • M. Atanasov
  • Ziff Davis Smart Business. Available at URL
  • 2001
1 Excerpt

Similar Papers

Loading similar papers…