Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.
Min Wook KilSijung KimYoungmi KwonGeuk LeePublished in: NPC (2004)
Keyphrases
- network intrusion
- access control policies
- network intrusion detection
- network security
- intrusion detection
- security policies
- access control
- rbac model
- information security
- role based access control
- anomaly detection
- fraud detection
- network intrusion detection systems
- conflict resolution
- expert systems
- network traffic
- optimal policy
- database
- intrusion detection system
- service platform
- distributed environment
- multi domain
- data mining techniques
- data warehouse
- data streams
- social networks
- data mining