{"title":"Investigating the transaction Log file to detect malicious transactions","authors":"O. B. Omran","doi":"10.1109/ICEMIS56295.2022.9914102","DOIUrl":null,"url":null,"abstract":"many advantages have been provided to organizations and people by using Database applications. It provides many services and benefits to companies and people. Therefore, these organizations and users have begun using Database systems in all their works. On the other hand, they are worried about their works when they use wrong information to organize and process some jobs. The wrong and invalid information comes when someone changes or enters invalid information to a database. In this paper, a technique has been proposed to investigating the transaction Log file to detect malicious transactions. In addition, the technique uses Functional dependency between the attributes to detect the malicious transactions which are wrong information. The technique begins by studying the Log file and defining all the transactions and their attributes which are used in each transaction. In addition, frequent pattern growth technique from data mining field is used to find the malicious transactions. Frequent pattern growth technique is used to be more efficient to detect the malicious transactions.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS56295.2022.9914102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
many advantages have been provided to organizations and people by using Database applications. It provides many services and benefits to companies and people. Therefore, these organizations and users have begun using Database systems in all their works. On the other hand, they are worried about their works when they use wrong information to organize and process some jobs. The wrong and invalid information comes when someone changes or enters invalid information to a database. In this paper, a technique has been proposed to investigating the transaction Log file to detect malicious transactions. In addition, the technique uses Functional dependency between the attributes to detect the malicious transactions which are wrong information. The technique begins by studying the Log file and defining all the transactions and their attributes which are used in each transaction. In addition, frequent pattern growth technique from data mining field is used to find the malicious transactions. Frequent pattern growth technique is used to be more efficient to detect the malicious transactions.