Intrusion Detection and Prevention System using ACL

  title={Intrusion Detection and Prevention System using ACL},
  author={A. Hyils Sharon Magdalene},
It is widely recognized that the threat to enterprises from insider activities is increasing and that significant costs are being incurred. The multi-faceted dimensions of insider threat and compromising actions have resulted in a diverse experience and understanding of what insider threats are and how to detect or prevent them. The purpose of this research is to investigate the potential for near real-time detection of insider threat activities within a large enterprise environment using… CONTINUE READING


Publications referenced by this paper.
Showing 1-8 of 8 references

Concurrency Issues of Distributed Advance Transaction Process

Sheetlani Jitendra, Gupta V.K
MAGDALENE, Orient. J. Comp. Sci. & Technol., • 2014

Performance Interoperability between RDBs and OODBs

Shukla Brahma Dutta, Gupta V.K
Res. J. Recent Sci., • 2012

Constraint of Secured Database in Distributed Database management System”, [advancement in computational technique & application

Gupta Dhiraj, Shukla Brahma Dutta

Application and Standards by W

Networks Security Essentials
Stallings, Pearson Education • 2007

Computer Securiy, National Institute of Standard Technology

Scarefone Karen, Mell Peter

Guide to Intrusion Detection and Prevention Systems

Mell Peter, Scarfone Karen
U.S. Department of Commerce, • 2007

On Deadlock Detection in Distributed Systems

IEEE Transactions on Software Engineering • 1980
View 1 Excerpt