DocumentCode :
2030261
Title :
Intrusion Detection System Modeling
Author :
Han, Keesook J. ; Giordano, Joseph
Author_Institution :
US Air Force Res. Lab., Rome, NY
fYear :
2006
fDate :
38869
Firstpage :
229
Lastpage :
235
Abstract :
Database management system (DBMS) controls and manages the data to eliminate data redundancy and to ensure data integrity, consistency and availability, among other features. Even though DBMS vendors continue to offer greater automation and simplicity in managing databases, the need for intrusion database modeling and management practices have not been considered. Our research focuses on not only anomaly detection but also intrusion database management through planning and best practice adoption to improve operational efficiency, lower costs, privacy and security
Keywords :
data integrity; data privacy; database management systems; security of data; anomaly detection; data availability; data consistency; data integrity; data redundancy; database management system; intrusion database management; intrusion database modeling; intrusion detection system modeling; Automatic control; Automation; Best practices; Control systems; Costs; Data privacy; Database systems; Intrusion detection; Modeling; Spatial databases;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
HPCMP Users Group Conference, 2006
Conference_Location :
Denver, CO
Print_ISBN :
0-7695-2797-3
Type :
conf
DOI :
10.1109/HPCMP-UGC.2006.41
Filename :
4134059
Link To Document :
بازگشت