Date of Graduation
5-2024
Document Type
Thesis
Degree Name
Bachelor of Science in Computer Science
Degree Level
Undergraduate
Department
Computer Science and Computer Engineering
Advisor/Mentor
Panda, Brajendra
Committee Member/Reader
Nelson, Alexander
Committee Member/Second Reader
Streeter, Lora
Abstract
With how much the world relies on technology and the critical database infrastructure that supports it, the infrastructures require efficient methods to detect and resolve suspicious database transactions, whether malicious or not. This paper focuses on an algorithm that detects and resolves malicious transactions in a database. The process begins with identifying suspicious transactions based on common patterns. When a transaction is flagged, the algorithm segments groups of suspicious transactions in separate log files, separating them for easy access. Within these segments, any dependent transactions that use data affected by the suspicious transactions will be stored there. After the transaction is logged, it will run through, but the user who had authorized the transaction will be contacted through a trusted third-party platform to verify that it was indeed them who authorized the transaction. If they did indeed authorize it, then no action is required as it is indeed a valid transaction. If they didn’t, all necessary information will be quickly accessed through the appropriate segments to revert damages.
Keywords
database; security; user verification; malicious transactions; algorithm
Citation
Pham, A. (2024). Development and Simulation of a Damage Assessment and Recovery Method for Critical Database Systems. Computer Science and Computer Engineering Undergraduate Honors Theses Retrieved from https://scholarworks.uark.edu/csceuht/136