Beta
32970

Performance Evaluation of the Detection Mechanisms for Malicious Transactions in DBMS

Article

Last updated: 24 Dec 2024

Subjects

-

Tags

-

Abstract

The main goal of database security mechanisms is to protect the data stored in the database from unauthorized accesses or malicious actions in general. In fact, several mechanisms needed to detect unauthorized database transactions executed by authorized or unauthorized users have been proposed and/or consolidated in the database arena. Most of these mechanisms can be implemented either externally as an autonomous subsystems separated from the DBMS (sharing the same machine or, preferably, in a dedicated machine), or implemented internally to the DBMS using database triggers. However, in the case of database triggers the performance degradation is expected to be quite high as the execution of database triggers is normally a high resource consuming task. In this paper, a proposed mechanism for
the detection of unauthorized transactions in DBMS is implemented. The proposed mechanism implemented internally to the DBMS using database procedures by compiling them into native code residing in shared libraries. This paper presents a practical example of three mechanisms for detection of malicious transactions in DBMS, the proposed mechanism, internal database triggers, and external procedure. Finally, this paper investigates the performance of the three implemented malicious transactions detection mechanisms in the Oracle 10g DBMS and evaluates the mechanisms using a telephone database. The experimental results showed that the external procedure and the native mechanisms provide the greatest performance gains for computation-intensive procedural operations compared with the database triggers.

DOI

10.21608/iceeng.2010.32970

Keywords

DBMS, Intrusion Detection System, Malicious Transactions

Authors

First Name

Wasim

Last Name

Shalish

MiddleName

Khalil

Affiliation

Syrian Armed Forces.

Email

-

City

-

Orcid

-

First Name

G.

Last Name

Salama

MiddleName

I.

Affiliation

Egyptian Armed Forces.

Email

-

City

-

Orcid

-

First Name

H.

Last Name

Mohamed

MiddleName

A.

Affiliation

Egyptian Armed Forces.

Email

-

City

-

Orcid

-

Volume

7

Article Issue

7th International Conference on Electrical Engineering ICEENG 2010

Related Issue

5537

Issue Date

2010-05-01

Receive Date

2019-05-23

Publish Date

2010-05-01

Page Start

1

Page End

12

Print ISSN

2636-4433

Online ISSN

2636-4441

Link

https://iceeng.journals.ekb.eg/article_32970.html

Detail API

https://iceeng.journals.ekb.eg/service?article_code=32970

Order

29

Type

Original Article

Type Code

833

Publication Type

Journal

Publication Title

The International Conference on Electrical Engineering

Publication Link

https://iceeng.journals.ekb.eg/

MainTitle

Performance Evaluation of the Detection Mechanisms for Malicious Transactions in DBMS

Details

Type

Article

Created At

22 Jan 2023