Design of Intrusion Detection System Preventing Insider Attack

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 421
  • Download : 884
DC FieldValueLanguage
dc.contributor.authorHan, Kyusuk-
dc.contributor.authorMun, Hyeran-
dc.contributor.authorYeun, Chan Yeob-
dc.contributor.authorKim, Kwangjo-
dc.date.accessioned2010-04-21T06:06:49Z-
dc.date.available2010-04-21T06:06:49Z-
dc.date.issued2009-08-24-
dc.identifier.citationThe 10th International Workshop on Information Security Applicationsen
dc.identifier.urihttp://hdl.handle.net/10203/17863-
dc.description.abstractRecent reports show that the loss from the malicious in-trusion by insiders is more serious than by outsiders. Despite that thevarious attacks are occurred by insiders and outsiders, most work hasbeen focused on the intrusion detection against outsider attacks. In thispaper, we improve the Wang et al.’s insider predection model andpropose the combined model with access control for the efficient insiderintrusion detection. We delegate the role of insider intrusion detectionto users that reduces the malicious trial of insiders and the overhead onthe centralized intrusion detection system. We also define the separatedaccess privilege that requires insiders to find the witness for accessingthe information. We show that the combination of the concept of accesscontrol enables more practical deployment of insider intrusion detectionsystem.en
dc.language.isoen_USen
dc.publisherWISAen
dc.titleDesign of Intrusion Detection System Preventing Insider Attacken
dc.typeArticleen

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0