dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
Zeitunlian, Arda |
|
dc.date.accessioned |
2017-02-01T07:21:22Z |
|
dc.date.available |
2017-02-01T07:21:22Z |
|
dc.date.copyright |
2007 |
en_US |
dc.date.issued |
2017-02-01 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/5128 |
|
dc.description.abstract |
With the advancement of
Internet technology,
securing information systems
from electronic attacks have
become a significant concern.
With all the preventive methods,
malicious users still
find new methods that overcome
the system security,
and access and modify the
sensitive information. To make
the process of damage assessment
and recovery fast and
efficient and in order not to
scan the whole log, researchers
have proposed different
methods for segmenting the log, and accordingly presented
different damage assessment
and recovery algorithms. Since
even segmenting the log into
clusters may not solve the
problem, as clusters/segments
may grow to be humongous
in size, this is in case of high
data/transaction dependency,
we suggest a method for segmenting
the log into clusters
and its sub-clusters; i.e, segmenting
the cluster; based on
exact data dependency [12],
into sub-clusters; based on
two different criteria: number
of data items or space occupied.
In this work, we also
present damage assessment
and recovery algorithms, and show the performance results. |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.relation.journal |
ISESCO Science and Technology Vision |
en_US |
dc.journal.volume |
3 |
en_US |
dc.journal.issue |
4 |
en_US |
dc.article.pages |
43-50 |
en_US |
dc.identifier.ctation |
Haraty, R., & Zeitunlian, A. (2007). Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare. ISESCO Science and Technology Vision, 3(4), 43-50. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://www.researchgate.net/profile/Ramzi_Haraty/publication/242402712_Damage_Assessment_and_Recovery_from_Malicious_Transactions_Using_Data_Dependency_for_Defensive_Information_Warfare/links/5450800d0cf201441e936271.pdf |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
|
dc.author.affiliation |
Lebanese American University |
en_US |