UPM Institutional Repository

Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.


Citation

Halboob, Waleed and Alghathbar, Khaled S. and Mamat, Ali and Mahmod, Ramlan and Shamsuddin, Solahuddin (2013) Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems. Information, 16 (3A). pp. 1817-1830. ISSN 1343-4500; ESSN: 1344-8994

Abstract

Computer security aims to provide data with three security services namely confidentiality, integrity and availability to protect the data from unauthorized access (or use), unauthorized modification and denial of access, respectively. Access control and intrusion detection systems are used in isolation while the range of their accuracy can be increased if they are integrated. This survey investigates the connection between the intrusion detection and access control systems and then it reviews the existing approaches for integrating them. We determined which intrusion detection types and detection methods are more appropriate to be integrated with access control systems and in which manner.


Download File

[img]
Preview
PDF (Abstract)
Event correlation.pdf

Download (84kB) | Preview

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
Publisher: International Information Institute
Keywords: Access control; Intrusion detection; Auditing and policies.
Depositing User: Ms. Nida Hidayati Ghazali
Date Deposited: 02 Jun 2014 04:40
Last Modified: 11 Sep 2015 00:25
URI: http://psasir.upm.edu.my/id/eprint/30646
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item