Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P407 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P407Improving Accuracy in Decision Making for Detecting Intruders
Monika Sehgal, Nitin Umesh
Citation :
Monika Sehgal, Nitin Umesh, "Improving Accuracy in Decision Making for Detecting Intruders," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 18-21, 2013. Crossref, https://doi.org/10.14445/22492615/ IJPTT-V3I1P407
Abstract
Keywords
Storage system, Policy, Database, Intrusion detection, Permission, Security.
References
[1] Carol J Fung, Jie Zhang and Raouf Boutaba, “Effective
Acquaintance Management based on Bayesian Learning for
Distributed Intrusion Detection Networks” , IEEE, 2012.
[2] Surachai CHITPINITYON, Kasom KOHT-ARSA, Surasak
SANGUANPONG and Jatuporn CHUCHUAY, “Design and
Implementation of Open Framework for Policy-Based
Network Access Control”, IEEE,2009.
[3] Khalid Alsubhi, Issam Aib, Jerome Francois and Raouf
Boutaba, “Policy-Based Security Configuration Management
Application to Intrusion Detection and Prevention”, IEEE,
2009.
[4] Amel Meddeb-Makhlouf, Yacine Djemaiel and Noureddine
Boudriga, “Cooperating systems for Global Intrusion
Detection and Tolerance”, IEEE, 2007.
[5] Mohammad Banikazemi, Dan Poff and Bulent Abali,
“Storage-Based Intrusion Detection for Storage Area
Networks (SANs)” Proc. of the 22nd IEEE / 13th NASA
Goddard Conference on Mass Storage Systems and
Technologies (MSST‟05), IEEE.
[6] Difan Zhang, Wei Yu and Rommie Hardy, “A Distributed
Network-Sensor Based Intrusion Detection Framework in
Enterprise Networks” IEEE, 2011.
[7] Hazem Hamed and Ehab Al-Shaer, “Taxonomy of Conflicts
in Network Security Policies”, DePaul University, 2006
IEEE.
[8] Sarwar Alam
“Network Security And Intrusion Detection System”
Department of Computer Science and Engineering, BRAC
University, Dhaka, Bangladesh, (2007).
[9] http://www.tripwire.org
[10] http://www.ossec.net
[11]http://www.darkreading.com/insiderthreat/167801100/security/securitymanagement/232900252/biggest-threats-come-from-insidethe-enterprise-survey-says.html
[12] The State of Network Security: Attitudes and Opinions
AlgoSec Survey Insights (2012).