Hybrid log segmentation for assured damage assessment

  • Authors:
  • Prahalad Ragothaman;Brajendra Panda

  • Affiliations:
  • University of Arkansas, Fayetteville, AR;University of Arkansas, Fayetteville, AR

  • Venue:
  • Proceedings of the 2003 ACM symposium on Applied computing
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

A database log is the primary resource for damage assessment and recovery after an electronic attack. The log is a sequential file stored in the secondary storage and it can grow to humongous proportions in course of time. To make the process of damage assessment and recovery more efficient, segmenting the log based on different criteria has been proposed before. But the trade off is that, either segmenting the log involves a lot of computation or damage assessment is a complicated process. In this research we propose to strike a balance through hybrid log segmentation. Our method will reduce the time taken to perform damage assessment while still segmenting the log fast enough so that no intricate computation is necessary. We build our model from a log that was previously segmented based on number of transactions, a time window for transactions to commit or space occupied by committed transactions. While performing damage assessment, we re-segment the log based on transaction dependency. Thus during repeated damage assessment procedures, we create new segments with dependent transactions in them so that the process of damage assessment becomes faster when there are repeated attacks on the system. We have discussed various cases that are applicable and also presented algorithms for each of the cases discussed.