State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
Application-Level Isolation to Cope with Malicious Database Users
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define Intrusion Confinement through isolation to address such security issue, its importance and finally present an isolation protocol.