Main Reference PaperDesign and Implementation of an Intrusion Response System for Relational Databases, IEEE Transactions on Knowledge and Data Engineering, June 2011.
  • It proposes two policies to handle the anomalous requests. The system proposes a novel Joint Threshold Administration Model (JTAM)that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs.

+ Description
  • It proposes two policies to handle the anomalous requests. The system proposes a novel Joint Threshold Administration Model (JTAM)that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs.

  • To prevent malicious modifications to policy objects from authorized users.

  • To propose the policies for handling the anamolus request.

  • To prevent unauthorized access of database.

+ Aim & Objectives
  • To prevent malicious modifications to policy objects from authorized users.

  • To propose the policies for handling the anamolus request.

  • To prevent unauthorized access of database.

  • For the policy matching procedure, This project, described algorithms to efficiently search the policy database for policies matching an anomalous request assessment. It added support for new system catalogs to hold policy related data, implemented new SQL commandsfor the policy administration tasks, and integrated the policy matching code with the query processing subsystem of PostgreSQL.

+ Contribution
  • For the policy matching procedure, This project, described algorithms to efficiently search the policy database for policies matching an anomalous request assessment. It added support for new system catalogs to hold policy related data, implemented new SQL commandsfor the policy administration tasks, and integrated the policy matching code with the query processing subsystem of PostgreSQL.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.