dc.contributor.author |
Haraty, Ramzi Ahmed |
|
dc.contributor.author |
Kaddoura, Sanaa |
|
dc.contributor.author |
Zekri, Ahmed |
|
dc.date.accessioned |
2018-01-23T14:25:22Z |
|
dc.date.available |
2018-01-23T14:25:22Z |
|
dc.date.copyright |
2017 |
en_US |
dc.date.issued |
2018-01-23 |
|
dc.identifier.issn |
1552-6283 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/6941 |
|
dc.description.abstract |
One of the critical concerns in the current era is information security. Companies are sharing vast online critical data, which exposes their databases to malicious attacks. When protection techniques fail to prevent an attack, recovery is needed. Database recovery is not a straightforward procedure, since the transactions are highly interconnected. Traditional recovery techniques do not consider the interconnection between transactions because this information is not saved anywhere in the log file. Thus, they rollback all the transactions starting from the detected malicious transaction to the end of the log file. Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. The proposed algorithm keeps track of the transactions that read from one another and store this information in a single matrix. The experimental results prove that the algorithm is faster than any other existing algorithm in this domain. |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.relation.journal |
International Journal on Semantic Web and Information Systems |
en_US |
dc.journal.volume |
13 |
en_US |
dc.journal.issue |
2 |
en_US |
dc.article.pages |
74-86 |
en_US |
dc.keywords |
Damage Assessment |
en_US |
dc.keywords |
Database Recovery |
en_US |
dc.keywords |
Defensive Information Warfare |
en_US |
dc.keywords |
Malicious Transaction |
en_US |
dc.keywords |
Matrix |
en_US |
dc.keywords |
Transaction Dependency |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.4018/IJSWIS.2017040105 |
en_US |
dc.identifier.ctation |
Haraty, R. A., Kaddoura, S., & Zekri, A. (2017). Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix. International Journal on Semantic Web and Information Systems (IJSWIS), 13(2), 74-86. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://www.igi-global.com/article/transaction-dependency-based-approach-for-database-damage-assessment-using-a-matrix/176734 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |