DocumentCode :
3726521
Title :
Information Warfare: Fighting Back Through the Matrix
Author :
Ramzi A. Haraty;Sanaa Kaddoura;Ahmed Zekri
Author_Institution :
Dept. of Comput. Sci. &
fYear :
2015
Firstpage :
449
Lastpage :
454
Abstract :
Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning the entire log from the point of attack to the end which is a slow procedure. In this paper, we present an efficient damage assessment and recovery algorithm to recover the database from malicious transactions. The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.
Keywords :
"Databases","Algorithm design and analysis","Intrusion detection","Clustering algorithms","Sparse matrices","Computer science"
Publisher :
ieee
Conference_Titel :
Computational Intelligence, 2015 IEEE Symposium Series on
Print_ISBN :
978-1-4799-7560-0
Type :
conf
DOI :
10.1109/SSCI.2015.73
Filename :
7376646
Link To Document :
بازگشت