Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
Computer security aims to provide data with three security services namely confidentiality, integrity and availability to protect the data from unauthorized access (or use), unauthorized modification and denial of access, respectively. Access control and intrusion detection systems are used in isola...
| Main Authors: | Halboob, Waleed, Alghathbar, Khaled S., Mamat, Ali, Mahmod, Ramlan, Shamsuddin, Solahuddin |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
International Information Institute
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30646/ http://psasir.upm.edu.my/id/eprint/30646/1/Event%20correlation.pdf |
Similar Items
TC-enabled and distributed cloud computing access control model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Trusted-based scalable access control model for broadcast XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
Temporal, delegable and cheap update access control to published XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
eMerge
by: Doropoulos, Moira
Published: (2013)
by: Doropoulos, Moira
Published: (2013)
RFDA: Reliable framework for data administration based on split-merge policy
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Subnational participation in extra-national policy solutions: Kitakyushu City as an intermediate agent in policy coordination
by: Takao, Yasuo
Published: (2017)
by: Takao, Yasuo
Published: (2017)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Chance to merge with top airline
by: Rasid, Amir Hisyam, et al.
Published: (2019)
by: Rasid, Amir Hisyam, et al.
Published: (2019)
Relationship between merging lane length and motorcyclist’s head check behavior during merging in
expressway
by: Ammar, Adnan, et al.
Published: (2018)
by: Ammar, Adnan, et al.
Published: (2018)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Hybrid Region Merging For Image Segmentation Using Optimal Global Feature With Global Merging Criterion Approach
by: Vadiveloo, Mogana
Published: (2020)
by: Vadiveloo, Mogana
Published: (2020)
Merging Application Models in a MDA Based Runtime Environment for Enterprise Information Systems
by: Davis, Jon, et al.
Published: (2005)
by: Davis, Jon, et al.
Published: (2005)
Extra home-office
by: Tan, Kok Hang, et al.
Published: (2013)
by: Tan, Kok Hang, et al.
Published: (2013)
Take extra precautions
by: Pfordten, Diyana
Published: (2021)
by: Pfordten, Diyana
Published: (2021)
An overview of neural networks use in anomaly intrusion detection systems
by: Sani, Yusuf, et al.
Published: (2009)
by: Sani, Yusuf, et al.
Published: (2009)
Algorithmic Framework For Onthology Mapping And Merging
by: Kiu, Ching Chieh
Published: (2007)
by: Kiu, Ching Chieh
Published: (2007)
Merging dietary assessment with the adolescent lifestyle
by: Schap, T., et al.
Published: (2014)
by: Schap, T., et al.
Published: (2014)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Extra Ear: Ear on Arm
by: Stelarc, Stelarc
Published: (2008)
by: Stelarc, Stelarc
Published: (2008)
Extra Ear and Extended Arm
by: Stelarc, Stelarc
Published: (2009)
by: Stelarc, Stelarc
Published: (2009)
Framework For Merging Object-Oriented Formal Specifications
by: Taibi , Fathi
Published: (2010)
by: Taibi , Fathi
Published: (2010)
Gentle reenergization of electrons in merging galaxy clusters
by: De Gasperin, F., et al.
Published: (2017)
by: De Gasperin, F., et al.
Published: (2017)
Evolutionary phases of merging clusters as seen by LOFAR
by: Wilber, A., et al.
Published: (2019)
by: Wilber, A., et al.
Published: (2019)
Merging ontologies requires interlocking instituitional worlds
by: Colomb, Robert Micheal, et al.
Published: (2007)
by: Colomb, Robert Micheal, et al.
Published: (2007)
The application of watershed and region merging for image segmentation.
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001)
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
‘Is the library open?’: Correlating unaffiliated access to academic libraries with open access support
by: Wilson, Katie, et al.
Published: (2019)
by: Wilson, Katie, et al.
Published: (2019)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
An Empirical Analysis Of Resistance To Organisational Change In Merging Banks
by: Abdul Muthalib, Fadilah
Published: (2001)
by: Abdul Muthalib, Fadilah
Published: (2001)
Radio observations of the merging galaxy cluster Abell 520
by: Hoang, D.N., et al.
Published: (2019)
by: Hoang, D.N., et al.
Published: (2019)
CONVAS2: A program for the merging of diffraction data
by: Rowles, Matthew
Published: (2010)
by: Rowles, Matthew
Published: (2010)
Affirmative action through extra prizes
by: Dahm, Matthias, et al.
Published: (2018)
by: Dahm, Matthias, et al.
Published: (2018)
Similar Items
-
TC-enabled and distributed cloud computing access control model
by: Halboob, Waleed, et al.
Published: (2014) -
Trusted-based scalable access control model for broadcast XML documents.
by: Halboob, Waleed, et al.
Published: (2013) -
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014) -
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008) -
Temporal, delegable and cheap update access control to published XML documents.
by: Halboob, Waleed, et al.
Published: (2013)