Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis.
Maryem Ait El HadjAhmed KhoumsiYahya BenkaouzMohammed ErradiPublished in: NETYS (2019)
Keyphrases
- security policies
- access control
- log analysis
- network management
- security management
- role based access control
- data processing
- log data
- machine learning
- information systems
- access control mechanism
- user behavior
- access control systems
- real world
- access control policies
- network security
- anomaly detection
- user interaction
- data management
- distributed systems
- domain specific
- relational databases
- association rules