A Review of Security Mechanisms for Detection of Malicious Transactions in Database

Article ID

CSTNWS0DG09

A Review of Security Mechanisms for Detection of Malicious Transactions in Database

Chitanlapudi Sai Charan
Chitanlapudi Sai Charan
Varada Bharat Srinivas
Varada Bharat Srinivas KL University
Dr. K.V.Daya Sagar
Dr. K.V.Daya Sagar
DOI

Abstract

Insider attacks formed the biggest threaten against database management systems. There are many mechanisms have been developed to detect and prevent the insider attacks called Detection of Malicious Activities in Database Systems DEMIDS. The DEMIDS consider as one of the last defenses mechanism of the database security system. There are many mechanisms that have been developed to detect and prevent the misuse activities like delete, and update data on the database systems. These mechanisms utilize auditing and profiling methods to detect and prevent the malicious activities. However these mechanisms still have problems to detect the misuse activities such as limit to detect the malicious data on authorized commands. This study will address these problems by propose a mechanism that utilizes dependency relationship among items to detect and prevent the malicious data by calculate a number of relations among data items. If the number of relations among items is not allowed any modification or deletion then the mechanism will detect activity as malicious activity. The evaluation parameters such as detect, false positive and false negative rate use to evaluate the accuracy of proposed mechanism.

A Review of Security Mechanisms for Detection of Malicious Transactions in Database

Insider attacks formed the biggest threaten against database management systems. There are many mechanisms have been developed to detect and prevent the insider attacks called Detection of Malicious Activities in Database Systems DEMIDS. The DEMIDS consider as one of the last defenses mechanism of the database security system. There are many mechanisms that have been developed to detect and prevent the misuse activities like delete, and update data on the database systems. These mechanisms utilize auditing and profiling methods to detect and prevent the malicious activities. However these mechanisms still have problems to detect the misuse activities such as limit to detect the malicious data on authorized commands. This study will address these problems by propose a mechanism that utilizes dependency relationship among items to detect and prevent the malicious data by calculate a number of relations among data items. If the number of relations among items is not allowed any modification or deletion then the mechanism will detect activity as malicious activity. The evaluation parameters such as detect, false positive and false negative rate use to evaluate the accuracy of proposed mechanism.

Chitanlapudi Sai Charan
Chitanlapudi Sai Charan
Varada Bharat Srinivas
Varada Bharat Srinivas KL University
Dr. K.V.Daya Sagar
Dr. K.V.Daya Sagar

No Figures found in article.

Varada Bharat Srinivas. 2014. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E8): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Article Matrices
Total Views: 8633
Total Downloads: 2224
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Review of Security Mechanisms for Detection of Malicious Transactions in Database

Chitanlapudi Sai Charan
Chitanlapudi Sai Charan
Varada Bharat Srinivas
Varada Bharat Srinivas KL University
Dr. K.V.Daya Sagar
Dr. K.V.Daya Sagar

Research Journals