Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
Computer security aims to provide data with three security services namely confidentiality, integrity and availability to protect the data from unauthorized access (or use), unauthorized modification and denial of access, respectively. Access control and intrusion detection systems are used in isola...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
International Information Institute
2013
|
Online Access: | http://psasir.upm.edu.my/id/eprint/30646/1/Event%20correlation.pdf |