Isolation Solution for Insecure Information Systems


Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define Intrusion Confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Keyword: Intrusion detection, Isolation, Information Systems

Cite this paper

@inproceedings{Balitanas2010IsolationSF, title={Isolation Solution for Insecure Information Systems}, author={Maricel O. Balitanas and Tai-Hoon Kim}, year={2010} }