| dc.contributor.author | Zarif, Omar B. El | |
| dc.date.accessioned | 2018-10-09T10:58:02Z | |
| dc.date.available | 2018-10-09T10:58:02Z | |
| dc.date.copyright | 2018 | en_US |
| dc.date.issued | 2018-10-09 | |
| dc.date.submitted | 2018-03-26 | |
| dc.identifier.uri | http://hdl.handle.net/10725/8599 | |
| dc.description.abstract | In the midst of the technology advancements that we are witnessing nowadays, information security is of an essence. Information warfare is actively introducing new offensive strategies to exploit databases that include sensitive data, or even classified and secret data in the case of the multilevel ones. The attacks vary from stealing sensitive data, to modifying crucial records, or simply corrupting the database. Many approaches to detect and prevent from such attacks are available, from firewalls to intrusion detection systems. But in many cases, prevention can fail, and detection could happen long after the attack. That implies the necessity of damage assessment and recovery to restore the database integrity. We introduce in this work a hybrid lightweight approach based on clustering and graphs to track transactional dependencies in multilevel databases. To the best of our knowledge, targeting multilevel databases has not been tackled before, so we will compare our approach with single level databases approaches, taking into consideration the additional security and integrity constraints imposed by the multilevel nature. | en_US |
| dc.language.iso | en | en_US |
| dc.subject | Lebanese American University -- Dissertations | en_US |
| dc.subject | Dissertations, Academic | en_US |
| dc.subject | Database security | en_US |
| dc.title | A hybrid damage assessment and recovery approach in multilevel databases. (c2018) | en_US |
| dc.type | Thesis | en_US |
| dc.term.submitted | Spring | en_US |
| dc.author.degree | MS in Computer Science | en_US |
| dc.author.school | SAS | en_US |
| dc.author.idnumber | 201100509 | en_US |
| dc.author.commembers | Rahal, Imad | |
| dc.author.commembers | Habre, Samer | |
| dc.author.department | Computer Science and Mathematics | en_US |
| dc.description.embargo | N/A | en_US |
| dc.description.physdesc | 1 hard copy: x, 43 leaves; ill.; 30 cm. available at RNL. | en_US |
| dc.author.advisor | Haraty, Ramzi A. | |
| dc.keywords | Damage Assessment | en_US |
| dc.keywords | Damage Recovery | en_US |
| dc.keywords | Data Dependency | en_US |
| dc.keywords | Information Warfare | en_US |
| dc.keywords | Malicious Attacks | en_US |
| dc.keywords | Transactional Dependency | en_US |
| dc.description.bibliographiccitations | Bibliography : leaves 40-43. | en_US |
| dc.identifier.doi | https://doi.org/10.26756/th.2018.79 | en_US |
| dc.author.email | omar.elzarif@lau.edu | en_US |
| dc.identifier.tou | http://libraries.lau.edu.lb/research/laur/terms-of-use/thesis.php | en_US |
| dc.publisher.institution | Lebanese American University | en_US |
| dc.author.affiliation | Lebanese American University | en_US |