dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
Kaddoura, Sanaa |
|
dc.contributor.author |
Zekri, Ahmed |
|
dc.date.accessioned |
2018-02-22T11:28:04Z |
|
dc.date.available |
2018-02-22T11:28:04Z |
|
dc.date.copyright |
2015 |
en_US |
dc.date.issued |
2018-02-22 |
|
dc.identifier.isbn |
9781479975600 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/7117 |
|
dc.description.abstract |
Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning the entire log from the point of attack to the end which is a slow procedure. In this paper, we present an efficient damage assessment and recovery algorithm to recover the database from malicious transactions. The algorithm is based on data dependency and uses a single matrix that will be later used during recovery. |
en_US |
dc.description.sponsorship |
IEEE |
en_US |
dc.description.sponsorship |
IEEE Computational Intelligence Society |
en_US |
dc.description.sponsorship |
IEEE Big Data |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.subject |
Computational intelligence -- Congresses |
en_US |
dc.title |
Information Warfare |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.title.subtitle |
Fighting Back Efficiently Through the Matrix |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.publication.place |
Los Alamitos, Calif. |
en_US |
dc.keywords |
Databases |
en_US |
dc.keywords |
Algorithm design and analysis |
en_US |
dc.keywords |
Intrusion detection |
en_US |
dc.keywords |
Clustering algorithms |
en_US |
dc.keywords |
Sparse matrices |
en_US |
dc.keywords |
Computer science |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references. |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.1109/SSCI.2015.73 |
en_US |
dc.identifier.ctation |
Haraty, R. A., Kaddoura, S., & Zekri, A. (2015, December). Information warfare: Fighting back through the matrix. In Computational Intelligence, 2015 IEEE Symposium Series on (pp. 449-454). IEEE. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.conference.date |
8-10 December 2015 |
en_US |
dc.conference.pages |
449-454 |
en_US |
dc.conference.place |
Cape Town, South Africa |
en_US |
dc.conference.subtitle |
2015 IEEE Symposium Series on Computational Intelligence : proceedings |
en_US |
dc.conference.title |
SSCI 2015 |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://ieeexplore.ieee.org/abstract/document/7376646/ |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.publication.date |
2015 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |