Database Performance Sensitivity for Malicious Transactions Detection Mechanisms | ||||
International Conference on Aerospace Sciences and Aviation Technology | ||||
Article 65, Volume 14, AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 14 – May 24 - 26, 2011, May 2011, Page 1-10 PDF (301.65 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/asat.2011.23379 | ||||
View on SCiNiTO | ||||
Authors | ||||
W. K. Shalish1; A. Z. Ghalwash2; H. M. El-Deeb3; G. I. Salama4; H. A. Mohamed4; K. Badran4 | ||||
1Syrian Armed Forces (M.T.C). | ||||
2Helwan University. | ||||
3Modern University for Technology and Information (M.T.I). | ||||
4Egyptian Armed Forces. | ||||
Abstract | ||||
Data represent today an important asset for companies and organizations and must be protected. Most of an organization’s sensitive and proprietary data resides in a Database Management System (DBMS). Various attacks (e.g., malicious transactions) may corrupt data items in the database systems, which decreases the integrity level of the database. Malicious transactions detection mechanisms are becoming more and more sophisticated to detect such attacks. These mechanisms are implemented either externally as an autonomous subsystems separated from the DBMS, internally to the DBMS using database triggers, or internally to the DBMS using database stored procedures by compiling them into native code residing in shared libraries. The focus of this paper is to investigate the effect of malicious transactions detection mechanisms implementation on database performance. This paper presents implementation of three mechanisms for detection of malicious transactions in the Oracle 10g DBMS, and investigates the performance of the three mechanisms using a telephone database. The experimental results showed that the average performance overhead caused by the activation of the external and the native mechanisms is about 40%, and about 48% for the database trigger mechanism. As a result, the external and the native mechanisms outperform the database trigger mechanism in term of database performance. | ||||
Keywords | ||||
DBMS; Malicious Transactions | ||||
Statistics Article View: 124 PDF Download: 215 |
||||