Investigating the transaction Log file to detect malicious transactions

O. B. Omran
{"title":"Investigating the transaction Log file to detect malicious transactions","authors":"O. B. Omran","doi":"10.1109/ICEMIS56295.2022.9914102","DOIUrl":null,"url":null,"abstract":"many advantages have been provided to organizations and people by using Database applications. It provides many services and benefits to companies and people. Therefore, these organizations and users have begun using Database systems in all their works. On the other hand, they are worried about their works when they use wrong information to organize and process some jobs. The wrong and invalid information comes when someone changes or enters invalid information to a database. In this paper, a technique has been proposed to investigating the transaction Log file to detect malicious transactions. In addition, the technique uses Functional dependency between the attributes to detect the malicious transactions which are wrong information. The technique begins by studying the Log file and defining all the transactions and their attributes which are used in each transaction. In addition, frequent pattern growth technique from data mining field is used to find the malicious transactions. Frequent pattern growth technique is used to be more efficient to detect the malicious transactions.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS56295.2022.9914102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

many advantages have been provided to organizations and people by using Database applications. It provides many services and benefits to companies and people. Therefore, these organizations and users have begun using Database systems in all their works. On the other hand, they are worried about their works when they use wrong information to organize and process some jobs. The wrong and invalid information comes when someone changes or enters invalid information to a database. In this paper, a technique has been proposed to investigating the transaction Log file to detect malicious transactions. In addition, the technique uses Functional dependency between the attributes to detect the malicious transactions which are wrong information. The technique begins by studying the Log file and defining all the transactions and their attributes which are used in each transaction. In addition, frequent pattern growth technique from data mining field is used to find the malicious transactions. Frequent pattern growth technique is used to be more efficient to detect the malicious transactions.
调查事务日志文件以检测恶意事务
使用数据库应用程序为组织和个人提供了许多好处。它为公司和个人提供了许多服务和福利。因此,这些组织和用户已经开始在他们的所有工作中使用数据库系统。另一方面,当他们使用错误的信息来组织和处理一些工作时,他们担心他们的工作。当有人更改或向数据库输入无效信息时,就会出现错误和无效的信息。本文提出了一种通过调查事务日志文件来检测恶意事务的技术。此外,该技术利用属性之间的功能依赖关系来检测错误信息的恶意交易。该技术首先研究Log文件并定义所有事务及其在每个事务中使用的属性。此外,利用数据挖掘领域的频繁模式增长技术来发现恶意交易。为了更有效地检测恶意事务,采用了频繁模式增长技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信