Skip to main content

Information warfare: a lightweight matrix-based approach for database recovery


The age of Internet technology has introduced new types of attacks to new assets that did not exist before. Databases that represent information assets are subject to attacks that have malicious intentions, such as stealing sensitive data, deleting records or violating the integrity of the database. Many counter measures have been designed and implemented to protect the databases and the information they host from attacks. While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. We compare our algorithm with other approaches and show the performance results.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13


  1. 1.

    Ammann P, Jajodia S, Liu P (2002) Recovery from malicious transactions. IEEE Trans Knowl Data Eng 14:1167–1185

    Article  Google Scholar 

  2. 2.

    Bai K, Liu P (2009) A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. In: Proceedings of the 12th international conference on extending database technology: advances in database technology (EDBT ’09), pp 720–731

  3. 3.

    Bernstein P, Hadzilacos V, Goodman N (1986) Concurrency control and recovery in database systems. Addison Wesley, London

    Google Scholar 

  4. 4.

    Chakraborty A, Majumdar A, Sural S (2009) A column dependency based approach for static and dynamic recovery of databases from malicious transactions. Int J Inf Secur 9:51–67

    Article  Google Scholar 

  5. 5.

    Chalurkar S, Kakade S, Khochare N, Meshramm B (2011) Survey on SQL injection attacks and their countermeasures. IJC EM Int J Comput Eng Manag 14:2230–7893

    Google Scholar 

  6. 6.

    Christian R, Ryan M, Wohlrabe J (2001) Handwashing and respiratory illness among young adults in military training. Am J Prev Med 21:79–83

    Article  Google Scholar 

  7. 7.

    Feng Y, Hu G, Xie M, Zhu H (2008) Tracking and repairing damaged databases using before image table. In: Japan–China joint workshop on frontier of computer science and technology, pp 36–41

  8. 8.

    Gray J, Reuter A (1993) Transaction processing concepts and techniques. Morgan Kaufmann, Los Altos

    MATH  Google Scholar 

  9. 9.

    Haraty R, Zeitunlian A (2007) Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare. ISESCO Sci Technol Vis 3:43–50

    Google Scholar 

  10. 10.

    Haraty R, Zbib M (2014) A matrix-based damage assessment and recovery algorithm. In: Innovations for community services (I4CS), pp 22–27

  11. 11.

    Haraty R, Zbib M, Masud M (2015) Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. J Peer-to-Peer Netw Appl. doi:10.1007/s12083-015-0361-z

    Google Scholar 

  12. 12.

    Hu Y, Panda B, Zhou J (2005) Succinct and fast accessible data structures for database damage assessment. In: Ghosh R, Mohanty H (eds) Distributed computing and internet technology, vol 3347. Springer, Berlin, pp 111–119

    Google Scholar 

  13. 13.

    Hutchinson W, Warren W (2001) Information warfare: corporate attack and defense in a digital world. Butterworth-Heinemann, Oxford

    Google Scholar 

  14. 14.

    Ji Q, Le J, Xia X (2012) Research on transaction dependency mechanism of self-healing database system. In: Proceedings of international conference on systems and informatics, pp 2357–2360

  15. 15.

    Kaddoura S, Haraty R, Zekri A, Masud M (2015) Tracking and repairing damaged healthcare databases using the matrix. Int J Distrib Senor Netw

  16. 16.

    Kumar C, Ramesh D, Kumar V (2013) A resilient failure evaluation and patch-up (R-FEP) algorithm for heterogeneous distributed databases. Int J Comput Appl 62:20–25

    Google Scholar 

  17. 17.

    Megan B (2015) Information warfare: what and how?

  18. 18.

    Panda B, Tripathy S (2000) Data dependency based logging for defensive information warfare. In: Proceedings of the 2000 ACM symposium on applied computing, pp 361–365

  19. 19.

    Panda B, Haque K (2002) Extended data dependency approach: a robust way of rebuilding database. In: Proceedings of the 2002 ACM symposium on applied computing, pp 445–452

  20. 20.

    Panda B, Ragothaman P (2003) Analyzing transaction logs for effective damage assessment. In: Gudes E, Shenoi S (eds) Research directions in data and applications security, vol 128. Springer, Cambridge, pp 121–134

    Google Scholar 

  21. 21.

    Panda B, Zhou J (2003) Database damage assessment using a matrix based approach: an intrusion response system. In: Proceedings of 7th international database engineering and applications symposium, pp 336–341

  22. 22.

    Panda B, Zuo Y (2004) Damage discovery in distributed database systems. In: Farkas C, Samarati P (eds) Research directions in data and applications security XVIII, vol 144. Springer, Berlin, pp 111–123

    Chapter  Google Scholar 

  23. 23.

    Panda B, Zuo Y (2004) Fuzzy dependency and its applications in damage assessment and recovery. In: Proceedings of the 2004 IEEE Workshop on Information Assurance, pp 350–357

  24. 24.

    Qin X, Sun J, Zheng J (2007) Data dependency based recovery approaches in survival database systems. In: Shi Y, Van Albada G, Dongarra J, Sloot P (eds) Computational Science—ICCS 2007, vol 4488. Springer, Berlin, pp 1131–1138

    Chapter  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Ramzi A. Haraty.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Haraty, R.A., Sai, M.E. Information warfare: a lightweight matrix-based approach for database recovery. Knowl Inf Syst 50, 287–313 (2017).

Download citation


  • Information warfare
  • Data dependency
  • Transactional dependency
  • Malicious attacks
  • Recovery