dc.contributor.author |
Zarif, Omar B. El |
|
dc.date.accessioned |
2018-10-09T10:58:02Z |
|
dc.date.available |
2018-10-09T10:58:02Z |
|
dc.date.copyright |
2018 |
en_US |
dc.date.issued |
2018-10-09 |
|
dc.date.submitted |
2018-03-26 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/8599 |
|
dc.description.abstract |
In the midst of the technology advancements that we are witnessing nowadays, information
security is of an essence. Information warfare is actively introducing new
offensive strategies to exploit databases that include sensitive data, or even classified
and secret data in the case of the multilevel ones. The attacks vary from stealing sensitive
data, to modifying crucial records, or simply corrupting the database. Many
approaches to detect and prevent from such attacks are available, from firewalls to intrusion
detection systems. But in many cases, prevention can fail, and detection could
happen long after the attack. That implies the necessity of damage assessment and recovery
to restore the database integrity. We introduce in this work a hybrid lightweight
approach based on clustering and graphs to track transactional dependencies in multilevel
databases. To the best of our knowledge, targeting multilevel databases has not been tackled before, so we will compare our approach with single level databases
approaches, taking into consideration the additional security and integrity constraints
imposed by the multilevel nature. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Lebanese American University -- Dissertations |
en_US |
dc.subject |
Dissertations, Academic |
en_US |
dc.subject |
Database security |
en_US |
dc.title |
A hybrid damage assessment and recovery approach in multilevel databases. (c2018) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Spring |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
201100509 |
en_US |
dc.author.commembers |
Rahal, Imad |
|
dc.author.commembers |
Habre, Samer |
|
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.description.physdesc |
1 hard copy: x, 43 leaves; ill.; 30 cm. available at RNL. |
en_US |
dc.author.advisor |
Haraty, Ramzi A. |
|
dc.keywords |
Damage Assessment |
en_US |
dc.keywords |
Damage Recovery |
en_US |
dc.keywords |
Data Dependency |
en_US |
dc.keywords |
Information Warfare |
en_US |
dc.keywords |
Malicious Attacks |
en_US |
dc.keywords |
Transactional Dependency |
en_US |
dc.description.bibliographiccitations |
Bibliography : leaves 40-43. |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2018.79 |
en_US |
dc.author.email |
omar.elzarif@lau.edu |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/thesis.php |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |