Detection of malicious transactions in DBMS | IEEE Conference Publication | IEEE Xplore

Detection of malicious transactions in DBMS


Abstract:

A major difficulty faced by organizations is the protection of data against malicious access or corruption. Database management systems (DBMS) are a key component in the ...Show More

Abstract:

A major difficulty faced by organizations is the protection of data against malicious access or corruption. Database management systems (DBMS) are a key component in the information infrastructure of most organizations and represent the ultimate layer in preventing unauthorized data accesses. Several mechanisms needed to protect data, such as authentication, user privileges, encryption, and auditing, have been implemented in commercial DBMS. However, typical database security mechanisms are not able to detect and handle many data security attacks. In fact, malicious transactions executed by unauthorized users that may gain access to the database by exploring system vulnerabilities and unauthorized database transactions executed by authorized users cannot be detected and stopped by typical security mechanisms. In this paper we propose a new mechanism for the detection of malicious transactions in DBMS. The paper presents a practical example of the implementation of the proposed mechanism in the Oracle 10g DBMS and evaluates the mechanism using the TPC-C benchmark.
Date of Conference: 12-14 December 2005
Date Added to IEEE Xplore: 20 March 2006
Print ISBN:0-7695-2492-3
Conference Location: Hunan, China

Contact IEEE to Subscribe

References

References is not available for this document.