Information Warfare: Fighting Back Through the Matrix
Abstract
Intrusion detection systems can detect a malicious transaction in a database. However,
sometimes this process takes time and the detection occurs after the transaction
commits. Databases cannot take any action in this case and the damage will spread to
a certain part of the database. There are some methods to recover the damaged part of
the database. Nevertheless, any recovery algorithm should be fast in order to decrease
denial of service time. In this paper, we present a new damage assessment and recovery
approach that recovers the database from malicious transactions in the least possible
time. The algorithm exploits the data dependency approach to store the needed log file
data in a single matrix that will be later used during recovery.
Author(s)
Haraty R., Kaddoura S., Zekri A.
Journal/Conference Information
2015 IEEE Symposium Series on Computational Intelligence,