dc.contributor.author |
Zbib, Mirna |
|
dc.date.accessioned |
2012-09-26T11:07:47Z |
|
dc.date.available |
2012-09-26T11:07:47Z |
|
dc.date.copyright |
2012 |
en_US |
dc.date.issued |
2012-09-26 |
|
dc.date.submitted |
2012-06-05 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/1255 |
|
dc.description |
Includes bibliographical references (leaves 58-60). |
en_US |
dc.description.abstract |
With the advancement of Internet technology, securing information systems from
electronic attacks have become a significant concern. With all the preventive methods,
malicious users still find new methods that overcome the system security, and access
and modify sensitive information. To make the process of damage assessment and
recovery fast and effective and in order not to scan the whole log, researchers have
proposed different methods for segmenting the log, and accordingly presented different
damage assessment and recovery algorithms. In this work we present an efficient
damage assessment and recovery algorithm to recover from malicious transactions based
on the concept of the matrix. We also compare the various approaches and present the
performance results. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Information warfare |
en_US |
dc.subject |
Data recovery (Computer science) |
en_US |
dc.subject |
Computer networks -- Security measures |
en_US |
dc.title |
Information warfare recovery-fighting back through the matrix. (c2012) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Spring |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
Arts and Sciences |
en_US |
dc.author.idnumber |
200904220 |
en_US |
dc.author.commembers |
Dr. Samer Habre, |
|
dc.author.commembers |
Dr. Azzam Mourad |
|
dc.author.woa |
OA |
en_US |
dc.description.physdesc |
1 bound copy: xiii, 64 leaves; ill.; 30 cm. available at RNL. |
en_US |
dc.author.division |
Computer Science |
en_US |
dc.author.advisor |
Dr. Ramzi Haraty |
|
dc.keywords |
Damage Assessment |
en_US |
dc.keywords |
Recovery |
en_US |
dc.keywords |
Malicious Transaction |
en_US |
dc.keywords |
Transaction Dependency |
en_US |
dc.keywords |
Data Dependency |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2012.21 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |