Isolation solution for insecure information systems

  • Authors:
  • Maricel Balitanas;Tai-Hoon Kim

  • Affiliations:
  • Department of Multimedia Engineering, Hannam University, Daejeon, Korea;Department of Multimedia Engineering, Hannam University, Daejeon, Korea

  • Venue:
  • DNCOCO'10 Proceedings of the 9th WSEAS international conference on Data networks, communications, computers
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define Intrusion Confinement through isolation to address such security issue, its importance and finally present an isolation protocol.