Abstract:
With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. We also compare the various approaches and present the performance results.
Citation:
Haraty, R. A., & Zbib, M. (2014, June). A matrix-based damage assessment and recovery algorithm. In Innovations for Community Services (I4CS), 2014 14th International Conference on (pp. 22-27). IEEE.