Online Detection of Malicious Transactions from Database System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Online Detection of Malicious Transactions from Database System

Dhanashree Parchand, Harmeet Kaur Khanuja

As today-s era mostly concentrated on online activities like net banking, e-transaction, security and privacy issues are at the peak with respect to their significance. Every organization is related with vast amount of information which is valuable. As database contains huge amount of information, data should be consistent, accurate and correct. Large numbers of database security breaches are occurring at a very high rate on daily basis. Today many approaches are used to protect the data as well as networks from attackers (attacks like SQLIA, Brute-force attack). Intrusion Detection System (IDS) is a way to make data more secure. Many researchers are concentrated on networks and operating system in this intrusion detection field. Proposed approach is for database so that it will prevent the data loss, maintain consistency and accuracy. Database security research is concerned about the protection of database from unauthorized access and malicious behavior. The unauthorized access is of many types, it may be in the form of execution of malicious transaction and this may lead to break the integrity of the system. Banking is the sector which is affected by this unauthorized activities and malicious transactions. So, it is today-s need to detect all this malicious transactions and also to provide some recommendation. In this paper, we proposed a system here to detect online malicious transactions. We also aim to reduce the future attacks and to detect major database attacks. In order to detect malicious transactions, we used data mining algorithm for framing a data dependency miner for our banking database IDS. Our methodology extracts the read-write dependency rules from the normal transactions and then these rules are used to check whether the coming transaction is malicious or not. Our system overcomes some drawbacks of existing system like it finds the malicious transactions that corrupt data items and also identifies the transactions that write data without permission and read data without permission. Eventually, we are pointing out the challenges in the field of database security and how these challenges can be used as opportunities to stimulate the area of database privacy and security. In this detection, we are using data mining algorithm ODADRM for designing a data dependency miner for our database intrusion detection system. ODADRM extracts read-write dependency rules and it tracks normal transaction and also detects malicious ones more effectively than existing approaches.

Keywords: Malicious Transaction, Data Mining, Data Dependency, Intrusion Detection System

Edition: Volume 4 Issue 6, June 2015

Pages: 403 - 408

Share this Article

How to Cite this Article?

Dhanashree Parchand, Harmeet Kaur Khanuja, "Online Detection of Malicious Transactions from Database System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155156, Volume 4 Issue 6, June 2015, 403 - 408

104 PDF Views | 97 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data Mining'

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2041 - 2047

Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data

Jani Basha, Dasari. Rajesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2004 - 2008

Document Classification Using Part of Speech in Text Mining

Sonam Tripathi, Tripti Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 979 - 981

Ranking Based Mining for Expert Human Resources on the World Wide Web

K. Ashesh, G. Vamsi Krishna

Share this Article

Similar Articles with Keyword 'Intrusion Detection System'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article
Top