Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/464510
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-02-20T09:49:52Z-
dc.date.available2023-02-20T09:49:52Z-
dc.identifier.urihttp://hdl.handle.net/10603/464510-
dc.description.abstractnewline With the rapid development of the World Wide Web and E-commerce, a concern of security is a very sensitive issue in this modern era of information and communication technology. A very large amount of time and effort has been invested by the research community working on database security to achieve high assurance of security and privacy. An important component of a secure database system is Intrusion Detection System which has the ability to successfully detect anomalous behaviour caused by applications and users. However, modeling the normal behaviour of a large number of users in a huge organization is quite tedious. Traditional techniques used in database security are not able to cope with the dynamic nature of the attacker. The use of soft computing approaches in database intrusion detection is an appealing concept due to its robustness and low solution cost and better rapport with reality. As part of the funded effort in database security, soft computing has proven to be capable of creating a system capable of detecting and characterizing anomalous behaviour which is composed of evolutionary computing tools with artificial neural networks and/or fuzzy logic. Artificial Neural Network (ANN) mimics the human brain that is composed of completely connected neurons and can have the ability to learn, categorize, and is able to predict the output. Genetic Algorithm (GA) is an optimization algorithm based on the principle of natural evolution. Soft Computing is a branch of artificial intelligence and ANN, Fuzzy logic and GA are the different dimensions of soft computing. In the current research, we have applied neural network and genetic algorithm is soft computing, as they aid in computation from unclear, incomplete input, and in the real world scenario, the output is not 100% accurate. This research focuses on building database intrusion detection models that can deal with the dynamic attitude of accessing the database by the users and able to detect intrusions with high accuracy and low false al
dc.format.extent
dc.languageEnglish
dc.relation159
dc.rightsuniversity
dc.titleApplication of Soft Computing Techniques in Database Intrusion Detection
dc.title.alternative
dc.creator.researcherBrahma, Anitarani
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guidePanigrahi, Suvasini
dc.publisher.placeSambalpur
dc.publisher.universityVeer Surendra Sai University of Technology
dc.publisher.institutionDepartment of Computer Science and Engineering and IT
dc.date.registered
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering and IT

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File133.76 kBAdobe PDFView/Open
02_prelim pages.pdf2.77 MBAdobe PDFView/Open
03_content.pdf780.81 kBAdobe PDFView/Open
04_abstract.pdf1.04 MBAdobe PDFView/Open
05_chapter 1.pdf8.17 MBAdobe PDFView/Open
06_chapter 2.pdf6.41 MBAdobe PDFView/Open
07_chapter 3.pdf13.25 MBAdobe PDFView/Open
08_chapter 4.pdf9.87 MBAdobe PDFView/Open
09_chapter 5.pdf7.27 MBAdobe PDFView/Open
10_chapter 6.pdf6.84 MBAdobe PDFView/Open
11_chapter 7.pdf2.3 MBAdobe PDFView/Open
12_annexures.pdf5.42 MBAdobe PDFView/Open
80_recommendation.pdf2.43 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: