Date of Graduation

5-2024

Document Type

Thesis

Degree Name

Bachelor of Science in Computer Science

Degree Level

Undergraduate

Department

Computer Science and Computer Engineering

Advisor/Mentor

Panda, Brajendra

Committee Member/Reader

Nelson, Alexander

Committee Member/Second Reader

Streeter, Lora

Abstract

With how much the world relies on technology and the critical database infrastructure that supports it, the infrastructures require efficient methods to detect and resolve suspicious database transactions, whether malicious or not. This paper focuses on an algorithm that detects and resolves malicious transactions in a database. The process begins with identifying suspicious transactions based on common patterns. When a transaction is flagged, the algorithm segments groups of suspicious transactions in separate log files, separating them for easy access. Within these segments, any dependent transactions that use data affected by the suspicious transactions will be stored there. After the transaction is logged, it will run through, but the user who had authorized the transaction will be contacted through a trusted third-party platform to verify that it was indeed them who authorized the transaction. If they did indeed authorize it, then no action is required as it is indeed a valid transaction. If they didn’t, all necessary information will be quickly accessed through the appropriate segments to revert damages.

Keywords

database; security; user verification; malicious transactions; algorithm

Share

COinS