prevention of malicious transactions in dbms Essay

Submitted By kandimallaashokkumar
Words: 6516
Pages: 27

Prevention of Malicious Transactions in
Database Management Systems

A thesis submitted in partial fulfillment of the requirements for the degree of

Bachelor of Technology in Computer Science and Engineering

by
Himanshu Gahlaut

Department of Computer Science and Engineering
National Institute of Technology Rourkela
May 2009

Prevention of Malicious Transactions in
Database Management Systems

A thesis submitted in partial fulfillment of the requirements for the degree of

Bachelor of Technology in Computer Science and Engineering

by
Himanshu Gahlaut

under the guidance of
Prof. Sanjay Kumar Jena

Department of Computer Science and Engineering
National Institute of Technology Rourkela
May 2009

National Institute of Technology Rourkela CERFTIFICATE
This is to certify that the thesis entitled, “PREVENTION OF MALICIOUS TRANSACTIONS
IN DATABASE MANAGEMENT SYSTEMS” submitted by HIMANSHU GAHLAUT in partial fulfillment of the requirements for the award of Bachelor of Technology Degree in
COMPUTER SCIENCE AND ENGINEERING at the National Institute of Technology,
Rourkela is an authentic work carried out by him under my supervision and guidance.
And to the best of my knowledge, the matter embodied in the thesis has not been submitted to any other University/Institute for the award of any Degree or Diploma.

PLACE: NIT Rourkela
DATE:

Dr. Sanjay Kumar Jena
Professor
National Institute of Technology
Rourkela – 769008

ACKNOWLEDGEMENT

I wish to express my deep sense of gratitude and indebtedness to Prof. Sanjay Kumar Jena,
Department of Computer Science and Engineering, N.I.T. Rourkela for introducing the present topic and for his inspiring guidance, valuable suggestions and support throughout this project work. I am thankful to all my Professors and Lecturers and members of the department for their generous help in various ways for the completion of the thesis work.

I would love to thank my family members for encouraging me at every stage of this project work. Last but not least, my sincere thanks to all my friends who have patiently extended all sorts of help for accomplishing this undertaking.

Himanshu Gahlaut

i

Table of Contents 1 Introduction ............................................................................................................................................... 1
2 Related Work ............................................................................................................................................. 5
2.1 Existing Intrusion Detection Systems .................................................................................................. 5
3 A new approach for intrusion detection in DBMS ..................................................................................... 8
3.1 Bloom Filters ....................................................................................................................................... 8
3.2 Counting Bloom Filters ...................................................................................................................... 10
3.3 Prevention Model ............................................................................................................................. 10
3.4 Intrusion Prevention System ............................................................................................................. 12
3.4.1 Profiling the transactions and assigning to users ...................................................................... 12
3.4.2 Giving weight to commands and setting the CBF’s for transactions ......................................... 13
3.4.3 Instant Detection and Prevention .............................................................................................. 13
4 Experimental Evaluation…