Abstract:
With the advancement of Internet technology, securing information systems from
electronic attacks have become a significant concern. With all the preventive methods,
malicious users still find new methods that overcome the system security, and access
and modify sensitive information. To make the process of damage assessment and
recovery fast and effective and in order not to scan the whole log, researchers have
proposed different methods for segmenting the log, and accordingly presented different
damage assessment and recovery algorithms. In this work we present an efficient
damage assessment and recovery algorithm to recover from malicious transactions based
on the concept of the matrix. We also compare the various approaches and present the
performance results.