dc.contributor.author |
Sai, Mohamed El |
|
dc.date.accessioned |
2015-09-30T09:03:09Z |
|
dc.date.available |
2015-09-30T09:03:09Z |
|
dc.date.copyright |
2015 |
en_US |
dc.date.issued |
2015-09-30 |
|
dc.date.submitted |
2015-04-17 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/2218 |
|
dc.description.abstract |
The age of Internet Technology that we are in has introduced new types of attacks to
new assets that didn’t exist before. Databases that represent Information assets are
subject to attacks that have malicious intentions such as steeling sensitive data, deleting
records or violating the integrity of the database. Many counter measures have been
designed and implemented to protect the databases and the information they host from
attacks. While preventive measures could be overcome and detection measures could
detect an attack late after damage has occurred, there is a need for a recovery algorithm
that will recover the database to its correct state before the attack has taken place.
Numerous damage assessment and recovery algorithms have been proposed by
researchers. In this work we present an efficient lightweight detection and recovery
algorithm that is based on the matrix approach and that can be used to recover from
malicious attacks. In addition, we will implement the algorithm and compare its
performance to other detection and recovery algorithms. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Information warfare |
en_US |
dc.subject |
Data recovery (Computer science) |
en_US |
dc.subject |
Computer networks -- Security measures |
en_US |
dc.subject |
Dissertations, Academic |
en_US |
dc.subject |
Lebanese American University -- Dissertations |
en_US |
dc.title |
Information warfare. (c2015) |
en_US |
dc.type |
Thesis |
en_US |
dc.title.subtitle |
a lightweight matrix based approach for database recovery |
en_US |
dc.term.submitted |
Spring |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
201105271 |
en_US |
dc.author.commembers |
Samer, Habre |
|
dc.author.commembers |
Mourad, Azzam |
|
dc.author.woa |
OA |
en_US |
dc.author.department |
Computer Science |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.description.physdesc |
1 hard copy: x, 64 leaves; col. ill.; 30 cm. available at RNL. |
en_US |
dc.author.advisor |
Haraty, Ramzi A. |
|
dc.keywords |
Information Warfare |
en_US |
dc.keywords |
Transactions |
en_US |
dc.keywords |
Transactional Dependency |
en_US |
dc.keywords |
Data Dependency |
en_US |
dc.keywords |
Malicious Attacks |
en_US |
dc.keywords |
Recovery |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references (leaves 61-64). |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2015.21 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |