Damage assessment & recovery from malicious transactions using data dependency for deffensive information warfare. (c2006)

LAUR Repository

Show simple item record

dc.contributor.author Zeitunlian, Arda
dc.date.accessioned 2011-10-11T09:24:23Z
dc.date.available 2011-10-11T09:24:23Z
dc.date.copyright 2006 en_US
dc.date.issued 2011-10-11
dc.date.submitted 2006-10-16
dc.identifier.uri http://hdl.handle.net/10725/731
dc.description Includes bibliographical references (leaves 47-48). en_US
dc.description.abstract With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [6][14], into sub-clusters; based on two different criteria: number of data items or space occupied. In this work, we also present damage assessment and recovery algorithms, and show the performance results. en_US
dc.language.iso en en_US
dc.subject Information warfare en_US
dc.subject Data recovery (Computer science) en_US
dc.subject Computer algorithms en_US
dc.subject Database security en_US
dc.title Damage assessment & recovery from malicious transactions using data dependency for deffensive information warfare. (c2006) en_US
dc.type Thesis en_US
dc.term.submitted Fall en_US
dc.author.degree MS in Computer Science en_US
dc.author.school Arts and Sciences en_US
dc.author.idnumber 200200080 en_US
dc.author.commembers Dr. Faisal Abu Khzam
dc.author.commembers Dr. Mohamad Ladan
dc.author.woa OA en_US
dc.description.physdesc 1 bound copy: x, 48 leaves; ill.; 30 cm. available at RNL. en_US
dc.author.division Computer Science en_US
dc.author.advisor Dr. Ramzi A. Haraty
dc.identifier.doi https://doi.org/10.26756/th.2006.33 en_US
dc.publisher.institution Lebanese American University en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR

Advanced Search


My Account