Main Reference PaperDesign and Implementation of an Intrusion Response System for Relational Databases, IEEE Transactions on Knowledge and Data Engineering, June 2011.
  • The paper proposes two policies to handle the anomalous requests. The proposed system has a novel Joint Threshold Administration Model(JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs.

+ Description
  • The paper proposes two policies to handle the anomalous requests. The proposed system has a novel Joint Threshold Administration Model(JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs.

  • To prevent malicious modifications to policy objects from authorized users.

  • To propose the policies for handling the anamolus request.

  • To prevent unauthorized access of database.

+ Aim & Objectives
  • To prevent malicious modifications to policy objects from authorized users.

  • To propose the policies for handling the anamolus request.

  • To prevent unauthorized access of database.

  • For the policy matching procedure, This project, described algorithms to efficiently search the policy database for policies matching an anomalous request assessment. It added support for new system catalogs to hold policy related data, implemented new SQL commandsfor the policy administration tasks, and integrated the policy matching code with the query processing subsystem of PostgreSQL.

+ Contribution
  • For the policy matching procedure, This project, described algorithms to efficiently search the policy database for policies matching an anomalous request assessment. It added support for new system catalogs to hold policy related data, implemented new SQL commandsfor the policy administration tasks, and integrated the policy matching code with the query processing subsystem of PostgreSQL.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.