An Enhanced Three Levels Security Policy

نویسندگان

  • A. RADI
  • D. ABOUTAJDINE
چکیده

Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Despite the undeniable progress in the area of computer security there is still much to be done to improve security of today’s computer systems and so many mechanisms have been developed to assure its security. These systems are vulnerable to attacks from both non-authorized users (outsider’s attacks) as well as attacks from authorized users (insiders’ attacks) who abuse their privileges. Many researches have proved that more than 60% of the attacks come from the inside of the computer systems. In the previous article [1], we have proposed an exact algorithm for the deployment of security policies for single computer systems but in this paper, we will propose an approach for complex computer systems, base on a three levels security policy. Each level will protect the computer system from both outsiders’ attacks and insiders’ attacks. This global security policy will allow the administrator of the security systems not only to detect attacks, but also to warn him about this intrusion and forbid access to the whole networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

On the Three Levels Security Policy Comparison between Svm and Decision Trees

The omnipresence of the computer system tools intensified every year in all companies. They integrate equipments, data and services that constitute a wealth to protect. Lot of mechanisms have been developed to assure the computer systems security. Conventional intrusions detection systems “IDS” have shown their insufficiencies and limits. To improve computer systems security approach, in our pr...

متن کامل

eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features

In this paper, we present an enhanced use of RBAC features in articulating a security policy for access control in medical database systems. The main advantage of this implementation is that it supports both MAC and DAC features at the same time; a feature that has been proved to be necessary in healthcare environments. The eMEDAC security policy that results from the above implementation provi...

متن کامل

Considering the Coefficient of Relationship between the Students’ Attitude toward Social Networks Policy making with Social Security Feeling

Abstract:This study aims at measuring the relationship between students‟ attitude toward govern-ment‟s virtual social network policy making with social security feeling, in another word, to which extent social security feeling emphasizing on social networks is determined via users‟ attitude toward government‟s media policy making? Analytical-descriptive method including survey is used in ...

متن کامل

تأثیر ایدئولوژی بر منافع ملی و امنیت ملی در سیاست خارجی جمهوری اسلامی ایران: با تاکید بر اندیشه امام خمینی(ره)

The Islamic Revolution of 1979 in Iran, led by Imam Khomeini as a religious authority, helped establish a political order whose domestic and foreign policy was based on Islamic ideology. The aim of this study was to investigate Imam Khomeini’s discourse of foreign policy in relation to national interests and security, and Islamic ideology on three levels, namely, ideology, strategy, and diploma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011