Detection and Monitoring of Processes that Exploit the Cursor Mechanism, Provoking Locks in Information and Information Search Systems

The subject of this research are information and information search systems, which include an integral component - a database management system (DBMS). In relational DBMS, there is a low-level cursor mechanism that is typically used by administrative processes for intentional or unintentional activa...

Full description

Saved in:
Bibliographic Details
Published inSystems of Signal Synchronization, Generating and Processing in Telecommunications (Online) pp. 1 - 6
Main Authors Vakulchik, O. V., Mazepa, R. B., Mikhaylov, V. Y.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2024
Subjects
Online AccessGet full text
ISSN2832-0514
DOI10.1109/SYNCHROINFO61835.2024.10617786

Cover

Abstract The subject of this research are information and information search systems, which include an integral component - a database management system (DBMS). In relational DBMS, there is a low-level cursor mechanism that is typically used by administrative processes for intentional or unintentional activation of locking processes. But they pose a serious risk for exploitation by intruder due to their high efficiency. The research subject is the monitoring of events that exploit cursor mechanisms to activate locking processes. The purpose of the research is increasing the informativeness of the blocking process monitoring tool in order to detect events that exploit the cursor mechanism. Locks in relational DBMS are implemented by a special mechanism that ensures data integrity during concurrent access to a single resource. However, there are other mechanisms that serve a completely different purpose, and such mechanisms can provoke the emergence of a lock. The cursor mechanism is used for complex row-by-row processing of large volumes of data and can be useful for reading each row or updating. The use of cursors is also associated with a range of administrative tasks, such as report generation. This article aims to identify dangerous attributes of cursor implementation that can provoke the invocation of a locking process. It is shown that a cursor at the application level can be implemented not explicitly in SQL but through special ODBC API attributes, thereby complicating the task of detecting a malicious cursor. SQL Server cursors can be embedded in a stored procedure, allowing a locking process to be implemented covertly. Both implementations may be associated with the incompetence of employees implementing the cursor or with the intention of unethical use of DBMS resources. The main result of the article is the increase the informativeness of the monitoring tool for locking processes by adding significant parameters that allow distinguishing the actions of an administrator from those of a regular user. The final construction allows revealing a cursor hidden in a stored procedure and the attributes of an application-level cursor.
AbstractList The subject of this research are information and information search systems, which include an integral component - a database management system (DBMS). In relational DBMS, there is a low-level cursor mechanism that is typically used by administrative processes for intentional or unintentional activation of locking processes. But they pose a serious risk for exploitation by intruder due to their high efficiency. The research subject is the monitoring of events that exploit cursor mechanisms to activate locking processes. The purpose of the research is increasing the informativeness of the blocking process monitoring tool in order to detect events that exploit the cursor mechanism. Locks in relational DBMS are implemented by a special mechanism that ensures data integrity during concurrent access to a single resource. However, there are other mechanisms that serve a completely different purpose, and such mechanisms can provoke the emergence of a lock. The cursor mechanism is used for complex row-by-row processing of large volumes of data and can be useful for reading each row or updating. The use of cursors is also associated with a range of administrative tasks, such as report generation. This article aims to identify dangerous attributes of cursor implementation that can provoke the invocation of a locking process. It is shown that a cursor at the application level can be implemented not explicitly in SQL but through special ODBC API attributes, thereby complicating the task of detecting a malicious cursor. SQL Server cursors can be embedded in a stored procedure, allowing a locking process to be implemented covertly. Both implementations may be associated with the incompetence of employees implementing the cursor or with the intention of unethical use of DBMS resources. The main result of the article is the increase the informativeness of the monitoring tool for locking processes by adding significant parameters that allow distinguishing the actions of an administrator from those of a regular user. The final construction allows revealing a cursor hidden in a stored procedure and the attributes of an application-level cursor.
Author Mazepa, R. B.
Mikhaylov, V. Y.
Vakulchik, O. V.
Author_xml – sequence: 1
  givenname: O. V.
  surname: Vakulchik
  fullname: Vakulchik, O. V.
  email: olga.vakulchik@mail.ru
  organization: Moscow Aviation Institute (National Research University),Moscow,Russia
– sequence: 2
  givenname: R. B.
  surname: Mazepa
  fullname: Mazepa, R. B.
  email: mrb402@mai.ru
  organization: Moscow Aviation Institute (National Research University),Moscow,Russia
– sequence: 3
  givenname: V. Y.
  surname: Mikhaylov
  fullname: Mikhaylov, V. Y.
  email: mihvj@yandex.ru
  organization: Moscow Aviation Institute (National Research University),Moscow,Russia
BookMark eNpNkEtPAjEcxKvRREW-gYeePLnYx24fR4MgJDyMcPFEuuW_UmFbsq1GvoCfW4iPeJrM5DdzmAt04oMHhK4p6VBK9O3sedIdPE2Hk_5UUMWLDiMs71AiqJRKHKG2lnofEy55nqtjdM4UZxkpaH6G2jG-EkI4Vbqg7Bx93kMCm1zw2PglHgfvUmicf8Ghwo9NsBAjRJxWJuHex3YTXNobwN23JoYGj8GujHexvjnA72F9aI6CXUfsPB76KjS1-Vv_72dgGrvCs11MUMdLdFqZTYT2j7bQvN-bdwfZaPow7N6NMqdpykQBZSW1AV4qy6WQTBqiqWKEUKuWuVwa0GUlrAYNFkqxB3UBwhpVMKoNb6Gr71kHAItt42rT7Ba_z_EvXZ9qCg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SYNCHROINFO61835.2024.10617786
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350373448
EISSN 2832-0514
EndPage 6
ExternalDocumentID 10617786
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i91t-65ebf79ae3b8c376727a09182001c8d47dae9bf6c9e9eceb6e3b95e6ca85219a3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:31:53 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-65ebf79ae3b8c376727a09182001c8d47dae9bf6c9e9eceb6e3b95e6ca85219a3
PageCount 6
ParticipantIDs ieee_primary_10617786
PublicationCentury 2000
PublicationDate 2024-July-1
PublicationDateYYYYMMDD 2024-07-01
PublicationDate_xml – month: 07
  year: 2024
  text: 2024-July-1
  day: 01
PublicationDecade 2020
PublicationTitle Systems of Signal Synchronization, Generating and Processing in Telecommunications (Online)
PublicationTitleAbbrev SYNCHROINFO
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003189512
Score 1.8780023
Snippet The subject of this research are information and information search systems, which include an integral component - a database management system (DBMS). In...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms administrator
cursor mechanism
Database systems
information search system
information system
intruder
Process monitoring
Search problems
Servers
SQL Server locking mechanism
status monitoring
Synchronization
System dynamics
Telecommunications
Title Detection and Monitoring of Processes that Exploit the Cursor Mechanism, Provoking Locks in Information and Information Search Systems
URI https://ieeexplore.ieee.org/document/10617786
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwGA1uD-KTihPv5EF8st3SS9o8T8cU14lOmE8jl69YxFa21Ad_gL_bpO3mBQRfSlNCCOnX5uTLOScInfYIWBNz5ZCIUycgUeowqrgjhVSck1R40gqcRwkdPgTX03DaiNUrLQwAVOQzcO1ttZevClnaVFnXLl-s31kLtcy1FmutEiomOA1a8NbRWeOj2b1_TPrDu_FVMhhTE7mhWQ16gbts5MdxKtVsMthEybIfNYnk2S21cOX7L4vGf3d0C3W-hHv4djUlbaM1yHfQxwXoinCVY54rXH_FNp2HixQ3QgFYYP3ENa4oeZk2BcD90oDxOR6BFQdni5dzW_mtsLl1fGN-owuc5biRM61a_16uqcy4MUXvoMngctIfOs3xC07GiHZoCCKNGAdfxNJ6vngRN-AitiQsGasgUhyYSKlkwECCoKYiC4FKHhtIwLi_i9p5kcMewnHKCaehYJH1FyRpzITn-z1FCA9DKtg-6tgxnL3WBhuz5fAd_PH8EG3YV1mzZo9QW89LODbYQIuTKiY-ASdju_M
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA06QX1SceK3eRCfbGfaJm2ep6PTrROdMJ9Gkt7iEFvZWh_8Af5uk7abHyD41pQQQnqTnNyec4LQ6QUBY2IeW8QXzPKIn1icxcJSUsVCkEQ6ygic-xELH7zrER3VYvVSCwMAJfkMbPNY_suPM1WYVFnLHF-M39kyWqGe59FKrrVIqejw1HjBWUVntZNm6_4xaod3g27UGTAdu1SfBx3Pnjfz40KVcj_pbKBo3pOKRvJsF7m01fsvk8Z_d3UTNb-ke_h2sSltoSVIt9HHJeQl5SrFIo1xNY9NQg9nCa6lAjDD-ZPIcUnKm-S6ALhdaDg-xX0w8uDJ7OXcVH7LTHYd9_RCOsOTFNeCpkXr38sVmRnXtuhNNOxcDduhVV_AYE04yS1GQSY-F-DKQBnXF8cXGl4EhoalgtjzYwFcJkxx4KBAMl2RU2BKBBoUcOHuoEaapbCLcJAIIhiV3DcOgyQJuHRc9yImRFDKJN9DTTOG49fKYmM8H779P96foLVw2O-Ne93o5gCtm89acWgPUSOfFnCkkUIuj8v4-AQofr9A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Systems+of+Signal+Synchronization%2C+Generating+and+Processing+in+Telecommunications+%28Online%29&rft.atitle=Detection+and+Monitoring+of+Processes+that+Exploit+the+Cursor+Mechanism%2C+Provoking+Locks+in+Information+and+Information+Search+Systems&rft.au=Vakulchik%2C+O.+V.&rft.au=Mazepa%2C+R.+B.&rft.au=Mikhaylov%2C+V.+Y.&rft.date=2024-07-01&rft.pub=IEEE&rft.eissn=2832-0514&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FSYNCHROINFO61835.2024.10617786&rft.externalDocID=10617786