Loading [MathJax]/extensions/MathZoom.js
Information Warfare: Fighting Back Through the Matrix | IEEE Conference Publication | IEEE Xplore

Information Warfare: Fighting Back Through the Matrix


Abstract:

Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of sy...Show More

Abstract:

Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning the entire log from the point of attack to the end which is a slow procedure. In this paper, we present an efficient damage assessment and recovery algorithm to recover the database from malicious transactions. The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.
Date of Conference: 07-10 December 2015
Date Added to IEEE Xplore: 11 January 2016
Print ISBN:978-1-4799-7560-0
Conference Location: Cape Town, South Africa

I. Introduction

Any computer that is connected to a network is vulnerable to malicious attack. The intrusion detection system can detect an attack and there are a lot of efforts in this domain like in [1] and [2]. Nevertheless, there is no guarantee that this detection will be immediate. Any delay in the detection process will give time to the attack to spread in the database. For this reason, there is always a need for an efficient recovery algorithm.

References

References is not available for this document.