Views 
   PDF Download PDF Downloads: 859

 Open Access -   Download full article: 

Intrusion Detection and Prevention System using ACL

A. HYILS SHARON MAGDALENE

Center for information Technology and Engineering M.S.University, Tirunelveli, India.

Article Publishing History
Article Received on :
Article Accepted on :
Article Published :
Article Metrics
ABSTRACT:

It is widely recognized that the threat to enterprises from insider activities is increasing and
that significant costs are being incurred. The multi-faceted dimensions of insider threat and
compromising actions have resulted in a diverse experience and understanding of what insider
threats are and how to detect or prevent them. The purpose of this research is to investigate the
potential for near real-time detection of insider threat activities within a large enterprise environment
using monitoring tools centred on the information infrastructure. As inside threat activities are not
confined solely to cyber-based threats, the research will explore the potential for harnessing a
variety of threat indicators buried in a different enterprise operations connected or interfacing with
the information infrastructure, while enabling human analysts to make informed decisions efficiently
and effectively.

KEYWORDS: Intrusion detection and prevention system (IDPS); TCP; UDP; ICMP; time to leave (TTL)

Copy the following to cite this article:


Copy the following to cite this URL:



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.