A matrix-based damage assessment and recovery algorithm

With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of...

Full description

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: Zbib, Mirna (author)
Format: conferenceObject
Published: 2014
Online Access:http://hdl.handle.net/10725/6996
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ieeexplore.ieee.org/abstract/document/6860548/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. We also compare the various approaches and present the performance results.