Detection and prevention of malicious of relational database management systems (RDBMS)

Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. Howeve...

Full description

Saved in:
Bibliographic Details
Main Author: Mohammed Rashad Aldhoqm, Arafat
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf
http://eprints.utm.my/id/eprint/38181/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.38181
record_format eprints
spelling my.utm.381812018-04-12T05:41:56Z http://eprints.utm.my/id/eprint/38181/ Detection and prevention of malicious of relational database management systems (RDBMS) Mohammed Rashad Aldhoqm, Arafat QA Mathematics Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. However, thesemechanisms still have some limitations in detecting insider attacks. This study proposes a mechanism called dependency mechanism (DM) by utilizing the dependency relationship among database attributes to detect and prevent the authorized modification on approved database records, which have been already used, approved and closed by the system. The proposed mechanism is based on high and low dependency among attributes(columns). These dependencies based on the high and low repetition and usage of the attribute in the database. When the DM recognizes and detects any authorized modification on the approved records, it considers it as a malicious. The results of proposed mechanism DM showed high ability to detect and prevent the malicious modification on the approved records. Flag Based Mechanism (FBM) is considered as a baseline for this study. The evaluation parameter is a detection rate, by which the accuracy of the proposed mechanism is evaluated and compared to the FBM technique. 2013-01 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf Mohammed Rashad Aldhoqm, Arafat (2013) Detection and prevention of malicious of relational database management systems (RDBMS). Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System.
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA Mathematics
spellingShingle QA Mathematics
Mohammed Rashad Aldhoqm, Arafat
Detection and prevention of malicious of relational database management systems (RDBMS)
description Insider attack is formsthe biggest threat against database management systems. Although many mechanisms have been developed to detect and prevent the misuse activities on the database systems, such as authorized modification on the approved records by the authorized users in malicious intent. However, thesemechanisms still have some limitations in detecting insider attacks. This study proposes a mechanism called dependency mechanism (DM) by utilizing the dependency relationship among database attributes to detect and prevent the authorized modification on approved database records, which have been already used, approved and closed by the system. The proposed mechanism is based on high and low dependency among attributes(columns). These dependencies based on the high and low repetition and usage of the attribute in the database. When the DM recognizes and detects any authorized modification on the approved records, it considers it as a malicious. The results of proposed mechanism DM showed high ability to detect and prevent the malicious modification on the approved records. Flag Based Mechanism (FBM) is considered as a baseline for this study. The evaluation parameter is a detection rate, by which the accuracy of the proposed mechanism is evaluated and compared to the FBM technique.
format Thesis
author Mohammed Rashad Aldhoqm, Arafat
author_facet Mohammed Rashad Aldhoqm, Arafat
author_sort Mohammed Rashad Aldhoqm, Arafat
title Detection and prevention of malicious of relational database management systems (RDBMS)
title_short Detection and prevention of malicious of relational database management systems (RDBMS)
title_full Detection and prevention of malicious of relational database management systems (RDBMS)
title_fullStr Detection and prevention of malicious of relational database management systems (RDBMS)
title_full_unstemmed Detection and prevention of malicious of relational database management systems (RDBMS)
title_sort detection and prevention of malicious of relational database management systems (rdbms)
publishDate 2013
url http://eprints.utm.my/id/eprint/38181/1/ArafatMohammedRashadMFSKSM2013.pdf
http://eprints.utm.my/id/eprint/38181/
_version_ 1643650224077406208
score 13.18916