Database Intrusion Detection System (IDS) was developed to defend the database from detrimental transactions. Mostly, the research on database security deals with the protection of database from illegal access. Several techniques, protocols, and algorithms were developed to increase the security level of database. In such works, there is a lack of time complexity analysis of the techniques. This time complexity has occurred due to the comparison process carried out at each time the user query is given i.e., comparing the profiles of online transactions and the stored authorized transactions each time when the query is received. This system time complexity also affects the system performance in terms of their precise security.