@incollection{, 26B7024A2AE242A8E774D675C432ECE9 , author={{Varada BharatSrinivas} and {KL University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}14816 } @incollection{b0, , title={{A software implementation of a genetic algorithm based approach to net-work intrusion detection. Software Engineering, Artificial intelligence}} , author={{ RenHui } and { G } and { MZulke Rnine }} , booktitle={{Networking unparallel/Distributed Computing, 2005 and First ACIS international Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth international Conference on}} , year={2005} } @incollection{b1, , title={{Detection of Insiders Misuse}} , author={{ NahlaShatnawi } and { QA } and { WailMardini }} , booktitle={{database Systems proceedings of the international Multi Conference of Engineers and computer Science}} Hong Kong , year={2011. 2011. 2011. March 16 -18, 2011} } @book{b2, , title={{The architecture of a network level intrusion Javidi}} , author={{ RHeady }} , year={1990} } @incollection{b3, , title={{Demids: A misuse detection system for database systems}} , author={{ CYChung } and { MGertz } and { KLevitt }} , booktitle={{14th IFIP WG11.3 Working Conference on Database and Application Security}} , year={2000} } @incollection{b4, , title={{Detection of Malicious Transactions in DBMS}} , author={{ ASYushi } and { ReenaBansal }} , journal={{international Journal of Information Technology and Knowledge Management}} 2 2 , year={2010. July-december 2010} } @incollection{b5, , title={{Intrusion detection in RBAC administered databases}} , author={{ EBertino } and { ETerzi }} , booktitle={{Computer Security Applications Conference}} , year={2005} , note={21st Annual} } @book{b6, , title={{System architecture for SQL injection and insider misuse detection system for DBMS. Information Technology}} , author={{ AAsmawi } and { ZMSidek }} , year={2008. 2008. 2008} , note={IT Sim. International Symposium on} } @incollection{b7, , title={{Identification of malicious trans-actions in database systems. Database Engineering and Applications Symposium}} , author={{ HYi } and { BPanda }} , booktitle={{Proceedings. Seventh international}} Seventh international , year={2003. 2003} } @incollection{b8, , title={{Weighted intratransactional rule mining for database intrusion detection}} , author={{ ASrivastava } and { SSural }} , booktitle={{Proceedings of the 10th Pacific-Asia conference on Advances in knowledge Discovery and Data Mining}} the 10th Pacific-Asia conference on Advances in knowledge Discovery and Data MiningSingapore , publisher={Springer-Verlag} , year={2006} Dept of Computer Science } @incollection{b9, , title={{Design and Implementation of Database Intrusion Detection system for Security in Database}} , author={{ URao } and { DR P }} , journal={{International Journal of Computer Applications}} 35 9 , year={2011. December 2011} } @incollection{b10, , title={{Design and Implementation of Database Intrusion detection system for Security in Database}} , author={{ UP R D RPatel }} , booktitle={{Proceedings of the 2008 ACM symposium on applied computing}} the 2008 ACM symposium on applied computingFortaleza, Ceara, Brazil, ACM , year={2011. December 2011} 35 } @incollection{b11, , title={{Detection of malicious transactions in DBMS. Dependable computing}} , author={{ MVieira } and { HMadeira }} , booktitle={{Proceedings. 11th Pacific Rim International Symposium on}} 11th Pacific Rim International Symposium on , year={2005. 2005} } @incollection{b12, , title={{Online detection of malicious data access using DBMS auditing}} , author={{ Jos }} , journal={{Lab}} , year={2008} }