The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Database security is a crucial concern today. One mechanism for safeguarding information stored in database systems is to use an Intrusion Detection System (IDS). Recently researchers are working on using machine learning techniques to increase the accuracy of the detection malicious attacks on database systems; Such as mining data dependencies among data items, access patterns of users and learning SQL commands. In this paper, we survey some intrusion detection approaches, which use these techniques. Also, we discuss the advantages and disadvantages of the approaches and compare them with considering their different features.

Keywords

Security, Database Systems, Intrusion Detection, Machine Learning, Data Dependency
User