Information warfare. (c2015)

The age of Internet Technology that we are in has introduced new types of attacks to new assets that didn’t exist before. Databases that represent Information assets are subject to attacks that have malicious intentions such as steeling sensitive data, deleting records or violating the integrity of...

Full description

Saved in:
Bibliographic Details
Main Author: Sai, Mohamed El (author)
Format: masterThesis
Published: 2015
Subjects:
Online Access:http://hdl.handle.net/10725/2218
https://doi.org/10.26756/th.2015.21
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The age of Internet Technology that we are in has introduced new types of attacks to new assets that didn’t exist before. Databases that represent Information assets are subject to attacks that have malicious intentions such as steeling sensitive data, deleting records or violating the integrity of the database. Many counter measures have been designed and implemented to protect the databases and the information they host from attacks. While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.