A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is
In this paper, we propose an innovative approach for database intrusion detection which combines evidences from current as well as past behavior of users. It consists of four components, namely, rule-based component, belief combination component, security sensitive history database component and Bayesian learning component. The rule-based component consists of a set of well-defined rules which give independent evidences about a transaction's behavior. An extension of Dempster-Shafer's theory isdoi:10.1109/cicybs.2009.4925094 dblp:conf/cics/PanigrahiSM09 fatcat:n5jthbnferf5fmgn5l5sfyn2gu