CFP last date
20 December 2024
Reseach Article

Framework to Detect Malicious Transactions in Database System

by Dhanashree Parchand, H. K. Khanuja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 2
Year of Publication: 2015
Authors: Dhanashree Parchand, H. K. Khanuja
10.5120/19292-0724

Dhanashree Parchand, H. K. Khanuja . Framework to Detect Malicious Transactions in Database System. International Journal of Computer Applications. 110, 2 ( January 2015), 45-48. DOI=10.5120/19292-0724

@article{ 10.5120/19292-0724,
author = { Dhanashree Parchand, H. K. Khanuja },
title = { Framework to Detect Malicious Transactions in Database System },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 2 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 45-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number2/19292-0724/ },
doi = { 10.5120/19292-0724 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:22.236675+05:30
%A Dhanashree Parchand
%A H. K. Khanuja
%T Framework to Detect Malicious Transactions in Database System
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 2
%P 45-48
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Every organization is associated with huge amount of information which is more valuable. Data is important and so it should be consistent, accurate and correct. Today many approaches are used to protect the data as well as networks from attackers (attacks like SQLIA, Brute-force attack). One way to make data more secure is using Intrusion Detection System (IDS). Many researches are done in this intrusion detection field but it mainly concentrated on networks and operating system. This approach is for database so that it will prevent the data loss, maintain consistency and accuracy. Database security research is concerned about the protection of database from unauthorized access. The unauthorized access may be in the form of execution of malicious transaction and this may lead to break the integrity of the system. Banking is one of the sectors which are suffering from million dollars losses only because of this unauthorized activities and malicious transactions. So, it is today's demand to detect malicious transactions and also to provide some recommendation. In this paper, we provided the detection system for the real-world problem of intrusion detection in the banking system and we are going to give some preventive measures to avoid or reduce future attacks. In order to detect malicious transactions, we used data mining algorithm for framing a data dependency miner for our banking database IDS. Our approach extracts the read-write dependency rules and then these rules are used to check whether the coming transaction is malicious or not. Our system not only finds the malicious transactions that corrupt data items but also identify the transactions that write data without permission and read data without permission.

References
  1. Mina Sohrabi, M. M. Javidi, S. Hashemi "Detecting intrusion transactions in database systems: a novel approach" J Intell Inf Syst 42:619-644 DOI 10. 1007 Springer 2014.
  2. Hu, Y. , and Panda, B. "Mining inter-transaction data dependencies for database intrusion detection". In Proceedings of innovations and advances in computer sciences and engineering. Springer 2010.
  3. Hu, Y. , and Panda, "A data mining approach for database intrusion detection. " In Proceedings of the ACM symposium on applied computing (pp. 711716) ACM 2004.
  4. Hashemi, S. , Yang, Y. , Zabihzadeh, D. , Kangavari, M. "Detecting intrusion transactions is databases using data item dependencies and anomaly analysis". Expert Systems, 25(5), 460473 2008.
  5. Lee, V. C. , Stankovic, J. , Son, S. H. "Intrusion detection in real-time database systems via time signatures. " In Proceedings of the 6th IEEE real time technology and applications symposium (RTAS00) (pp. 124133). New York: IEEE Press 2000.
  6. Srivastava, A. , Sural, S. , Majumdar, A. K. "Database intrusion detection using weighted sequence mining. " Journal of Computers, 1(4), 817 2006.
  7. Bertino, E. , Kamra, A. , Terzi, E. , Vakali, A. "Intrusion detection in RBAC- administered databases. " In Proceedings of 21st annual computer security applications conference (pp. 170182) 2005.
  8. Barbara, D, Goel, R. , Jajodia, S. "Mining malicious data corruption with Hidden Markov Models. " in Proceedings of the 16th annual IFIP WG 11. 3 working conference on data and application security. Cambridge 2002.
  9. Chung, C. Y. , Gertz, M. , Levitt, K. "Demids: a misuse detection system for database systems. " In Integrity and internal control information systems: strategic views on the need for control (pp. 159178) Norwell: Kluwer 2000
  10. Webb, G. I. , and Zhang, S. "K-Optimal rule discovery. Data Mining and Knowledge Discovery" 10(1), 3979, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Malicious Transaction Data Mining Data Dependency.