DocumentCode :
3779363
Title :
Information matrix: Fighting back using a matrix
Author :
Sanaa Kaddoura
Author_Institution :
Department of Mathematics and Computer Science, Beirut Arab University, Lebanon
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning the entire log from the point of attack to the end which is a slow procedure. In this paper, we present an efficient damage assessment and recovery algorithm to recover the database from malicious transactions. The algorithm is based on data dependency and uses a single matrix.
Keywords :
"Databases","Intrusion detection","History","Algorithm design and analysis","Weapons","Computers","Computer crime"
Publisher :
ieee
Conference_Titel :
Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of
Electronic_ISBN :
2161-5330
Type :
conf
DOI :
10.1109/AICCSA.2015.7507127
Filename :
7507127
Link To Document :
بازگشت