Detection and prevention of malicious of relational database management systems (RDBMS)
Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. Howeve...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf http://eprints.utm.my/id/eprint/38181/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.38181 |
---|---|
record_format |
eprints |
spelling |
my.utm.381812018-04-12T05:41:56Z http://eprints.utm.my/id/eprint/38181/ Detection and prevention of malicious of relational database management systems (RDBMS) Mohammed Rashad Aldhoqm, Arafat QA Mathematics Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. However, thesemechanisms still have some limitations in detecting insider attacks. This study proposes a mechanism called dependency mechanism (DM) by utilizing the dependency relationship among database attributes to detect and prevent the authorized modification on approved database records, which have been already used, approved and closed by the system. The proposed mechanism is based on high and low dependency among attributes(columns). These dependencies based on the high and low repetition and usage of the attribute in the database. When the DM recognizes and detects any authorized modification on the approved records, it considers it as a malicious. The results of proposed mechanism DM showed high ability to detect and prevent the malicious modification on the approved records. Flag Based Mechanism (FBM) is considered as a baseline for this study. The evaluation parameter is a detection rate, by which the accuracy of the proposed mechanism is evaluated and compared to the FBM technique. 2013-01 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf Mohammed Rashad Aldhoqm, Arafat (2013) Detection and prevention of malicious of relational database management systems (RDBMS). Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA Mathematics |
spellingShingle |
QA Mathematics Mohammed Rashad Aldhoqm, Arafat Detection and prevention of malicious of relational database management systems (RDBMS) |
description |
Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. However, thesemechanisms still have some limitations in detecting insider attacks. This study proposes a mechanism called dependency mechanism (DM) by utilizing the dependency relationship among database attributes to detect and prevent the authorized modification on approved database records, which have been already used, approved and closed by the system. The proposed mechanism is based on high and low dependency among attributes(columns). These dependencies based on the high and low repetition and usage of the attribute in the database. When the DM recognizes and detects any authorized modification on the approved records, it considers it as a malicious. The results of proposed mechanism DM showed high ability to detect and prevent the malicious modification on the approved records. Flag Based Mechanism (FBM) is considered as a baseline for this study. The evaluation parameter is a detection rate, by which the accuracy of the proposed mechanism is evaluated and compared to the FBM technique. |
format |
Thesis |
author |
Mohammed Rashad Aldhoqm, Arafat |
author_facet |
Mohammed Rashad Aldhoqm, Arafat |
author_sort |
Mohammed Rashad Aldhoqm, Arafat |
title |
Detection and prevention of malicious of relational database management systems (RDBMS) |
title_short |
Detection and prevention of malicious of relational database management systems (RDBMS) |
title_full |
Detection and prevention of malicious of relational database management systems (RDBMS) |
title_fullStr |
Detection and prevention of malicious of relational database management systems (RDBMS) |
title_full_unstemmed |
Detection and prevention of malicious of relational database management systems (RDBMS) |
title_sort |
detection and prevention of malicious of relational database management systems (rdbms) |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf http://eprints.utm.my/id/eprint/38181/ |
_version_ |
1643650224077406208 |
score |
13.214268 |