dc.contributor.author |
Zeitunlian, Arda |
|
dc.date.accessioned |
2011-10-11T09:24:23Z |
|
dc.date.available |
2011-10-11T09:24:23Z |
|
dc.date.copyright |
2006 |
en_US |
dc.date.issued |
2011-10-11 |
|
dc.date.submitted |
2006-10-16 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/731 |
|
dc.description |
Includes bibliographical references (leaves 47-48). |
en_US |
dc.description.abstract |
With the advancement of Internet technology, securing information systems
from electronic attacks have become a significant concern. With all the preventive
methods, malicious users still find new methods that overcome the system security,
and access and modify the sensitive information. To make the process of damage
assessment and recovery fast and efficient and in order not to scan the whole log,
researchers have proposed different methods for segmenting the log, and accordingly
presented different damage assessment and recovery algorithms. Since even
segmenting the log into clusters may not solve the problem, as clusters/segments may
grow to be humongous in size, this is in case of high data/transaction dependency, we
suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [6][14], into sub-clusters;
based on two different criteria: number of data items or space occupied. In this work,
we also present damage assessment and recovery algorithms, and show the
performance results. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Information warfare |
en_US |
dc.subject |
Data recovery (Computer science) |
en_US |
dc.subject |
Computer algorithms |
en_US |
dc.subject |
Database security |
en_US |
dc.title |
Damage assessment & recovery from malicious transactions using data dependency for deffensive information warfare. (c2006) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Fall |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
Arts and Sciences |
en_US |
dc.author.idnumber |
200200080 |
en_US |
dc.author.commembers |
Dr. Faisal Abu Khzam |
|
dc.author.commembers |
Dr. Mohamad Ladan |
|
dc.author.woa |
OA |
en_US |
dc.description.physdesc |
1 bound copy: x, 48 leaves; ill.; 30 cm. available at RNL. |
en_US |
dc.author.division |
Computer Science |
en_US |
dc.author.advisor |
Dr. Ramzi A. Haraty |
|
dc.identifier.doi |
https://doi.org/10.26756/th.2006.33 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |