期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:6
DOI:10.15680/ijircce.2015.0306059
出版社:S&S Publications
摘要:Database security is also a specialty within the broader discipline of computer security. Information isthe most critical resource for many organizations. Existing intrusion detection systems use logs to detect malicioustransactions. Logs are the histories of the transactions committed in the database. The disadvantage of using logs is thatthey require lot of memory. In addition to this sometimes even after a transaction is detected as malicious it cannot berolled back. In this paper we present a method by which we can overcome the uses of logs and can detect malicioustransactions before they are committed. We use specific user-profiles to store the sequence of commands in atransaction and use a prevention model for instant detection of malicious transactions