.

Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi A.
dc.contributor.author Zeitunlian, Arda
dc.date.accessioned 2017-02-01T07:21:22Z
dc.date.available 2017-02-01T07:21:22Z
dc.date.copyright 2007 en_US
dc.date.issued 2017-02-01
dc.identifier.uri http://hdl.handle.net/10725/5128
dc.description.abstract With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. In this work, we also present damage assessment and recovery algorithms, and show the performance results. en_US
dc.language.iso en en_US
dc.title Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare en_US
dc.type Article en_US
dc.description.version Published en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.relation.journal ISESCO Science and Technology Vision en_US
dc.journal.volume 3 en_US
dc.journal.issue 4 en_US
dc.article.pages 43-50 en_US
dc.identifier.ctation Haraty, R., & Zeitunlian, A. (2007). Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare. ISESCO Science and Technology Vision, 3(4), 43-50. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://www.researchgate.net/profile/Ramzi_Haraty/publication/242402712_Damage_Assessment_and_Recovery_from_Malicious_Transactions_Using_Data_Dependency_for_Defensive_Information_Warfare/links/5450800d0cf201441e936271.pdf en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account