Security configuration management in Intrusion Detection and Prevention Systems

被引:5
|
作者
Alsubhi, K. [1 ]
Alhazmi, Y. [2 ]
Bouabdallah, N. [3 ]
Boutaba, R. [1 ,4 ]
机构
[1] David R. Cheriton School of Computer Science, University of Waterloo, Department of computer, Waterloo, ON, N2L 3G1, Canada
[2] Electrical and Computer Engineering, University of Waterloo, ON, Canada
[3] INRIA, Campus Universitaire de Beaulieu, Rennes Cedex 35042, France
[4] Division of IT Convergence Engineering, POSTECH, Pohang, KB 790-784, Korea, Republic of
关键词
D O I
10.1504/IJSN.2012.048493
中图分类号
学科分类号
摘要
引用
收藏
页码:30 / 39
相关论文
共 50 条
  • [1] Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention
    Alsubhi, Khalid
    Aib, Issam
    Francois, Jerome
    Boutaba, Raouf
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1051 - +
  • [2] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Cai, Chuanxi
    Mei, Shue
    Zhong, Weijun
    [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (02): : 55 - 71
  • [3] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Chuanxi Cai
    Shue Mei
    Weijun Zhong
    [J]. Information Technology and Management, 2019, 20 : 55 - 71
  • [4] Intrusion Detection and Prevention Systems (IDPS) and Security Issues
    Sharifi, A. Ahmad
    Noorollahi, B. Akram
    Farokhmanesh, Farnoosh
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 80 - 84
  • [5] Intrusion prevention systems: superior security
    Rowan, Tom
    [J]. Network Security, 2007, 2007 (09) : 11 - 15
  • [6] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [7] Security Implications of Network Address Translation on Intrusion Detection and Prevention Systems
    Sourour, Meharouech
    Adel, Bouhoula
    Tarek, Abbes
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 1 - 5
  • [8] Security and Intrusion Detection on Critical SCADA Systems for Water Management
    Stoian, I.
    Ignat, S.
    Capatina, D.
    Ghiran, O.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, 2014,
  • [9] Intrusion detection: Introduction to intrusion detection and security information management
    Debar, H
    Viinikka, J
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
  • [10] Optimal configuration of intrusion detection systems
    Birendra Mishra
    Inna Smirnova
    [J]. Information Technology and Management, 2021, 22 : 231 - 244