Malware Database: Symbiosis Institute of Technology A DBMS Project Report On
Malware Database: Symbiosis Institute of Technology A DBMS Project Report On
MALWARE DATABASE
Submitted by
0
Index
1. Introduction.………………………………………………………………………………………………….1
2. Problem Statement…………………………………………………………………………………………...2
3. Functional Requirements…………………………………………………………………………………….3
5. EER diagram……………………………………………………………………………………….5
6. Relational schema………………………………………………………………………………….6
7. Keys………………………………………………………………………………………………..6
8. Codd’s Rules……………………………………………………………………………………………..7
1
INTRODUCTION
The objective of the particular project we are working on is a database for all the malwares. Malwares being a
crucial entity for our industry of computer science and IT sector, having a uniform database for all of the kinds
of any malware is an important need of today’s era and that’s where we are focusing on. Malware defined as
malicious file that intends or sometimes not intentionally create a harmful effect on a computer system.
• Virus
• Worms
• Spyware
• Trojans
• Ransomware
So being a vast sector it’s really necessary for all the anti-virus providers to be updated and ready with
solutions as soon as newer one arrives and for researchers as well.
1
PROBLEM STATEMENT
With “everything becoming computer oriented” security is a very much important and antivirus does the job
well but even that needs to be updated and efficient every time, so with our project we are here to provide an
efficient database for malwares.
With our malware database website any user (anti-virus providers and researchers) will look for a particular
antivirus and will get all the related information regarding its creation through an URL so it’s like an internet
of malware.
So, with all the threats and risk of having security breach in our ecosystem which is already being a part of our
life, we must stay on the line for defense against the virtual threats. With researchers any upcoming
possibilities could be tackled and losses like ransomware could have easily being saved.
All of the lives are dependent on virtual means from money payments to now work from home making
everyone online, it’s really needs to be safeguarded from any known or unknown threats.
So, malware database will be the uniform place for all the safety needs in software/virtual ecosystem.
2
FUNCTIONAL REQUIREMENTS
• Every User needs to sign up with username, password, email and contact details.
• Every user will be assigned a unique U_ID.
• User may have a membership.
• User will upload or download the information about malware from the website.
• User can also comment on any malware. This will store the C_ID, C_Time & C_Date.
• User can connect to Admin through Technical support.
• Admin will manage all the Malwares through website.
• Different Malware will have different M_ID, M_Name, M_Size, M_Report, M_Status, M_URL, &
M_Category.
• Malware has many categories.
• Malware can be a worm, adware, Spyware, Trojan Horse or Ransomware
3
ENTITIES & THEIR RELATIONSHIPS
Entities:
• User
• Admin
• Malware
• Comments
• Membership
• Login
• Payment
4
ER DIAGRAM
5
RELATIONAL SCHEMA
1. User_Acc:
2. Admin:
3. Comments:
4. Membership:
5. Malware:
6. Login
L_ID U_username U_password
7. Payment
P_ID P_Date P_Time U_ID U_LastName
7
Rule 8: Physical Data Independence
The data stored in a database must be independent of the applications that access the database. Any
change in the physical structure of a database must not have any impact on how the data is being
accessed by external applications.
This rule is followed in our database.