.

Information warfare. (c2015)

LAUR Repository

Show simple item record

dc.contributor.author Sai, Mohamed El
dc.date.accessioned 2015-09-30T09:03:09Z
dc.date.available 2015-09-30T09:03:09Z
dc.date.copyright 2015 en_US
dc.date.issued 2015-09-30
dc.date.submitted 2015-04-17
dc.identifier.uri http://hdl.handle.net/10725/2218
dc.description.abstract The age of Internet Technology that we are in has introduced new types of attacks to new assets that didn’t exist before. Databases that represent Information assets are subject to attacks that have malicious intentions such as steeling sensitive data, deleting records or violating the integrity of the database. Many counter measures have been designed and implemented to protect the databases and the information they host from attacks. While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms. en_US
dc.language.iso en en_US
dc.subject Information warfare en_US
dc.subject Data recovery (Computer science) en_US
dc.subject Computer networks -- Security measures en_US
dc.subject Dissertations, Academic en_US
dc.subject Lebanese American University -- Dissertations en_US
dc.title Information warfare. (c2015) en_US
dc.type Thesis en_US
dc.title.subtitle a lightweight matrix based approach for database recovery en_US
dc.term.submitted Spring en_US
dc.author.degree MS in Computer Science en_US
dc.author.school SAS en_US
dc.author.idnumber 201105271 en_US
dc.author.commembers Samer, Habre
dc.author.commembers Mourad, Azzam
dc.author.woa OA en_US
dc.author.department Computer Science en_US
dc.description.embargo N/A en_US
dc.description.physdesc 1 hard copy: x, 64 leaves; col. ill.; 30 cm. available at RNL. en_US
dc.author.advisor Haraty, Ramzi A.
dc.keywords Information Warfare en_US
dc.keywords Transactions en_US
dc.keywords Transactional Dependency en_US
dc.keywords Data Dependency en_US
dc.keywords Malicious Attacks en_US
dc.keywords Recovery en_US
dc.description.bibliographiccitations Includes bibliographical references (leaves 61-64). en_US
dc.identifier.doi https://doi.org/10.26756/th.2015.21 en_US
dc.publisher.institution Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account