Network intrusion protection system using rule-based DB and RBAC policy

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Role-Based Access Control (RBAC) is a method to manage and control a host in a distributed manner by applying the rules to the users on a host. This paper proposes a rule based intrusion protection system based on RBAC. It admits or rejects users to access the network resources by applying the rules to the users on a network. Proposed network intrusion protection system has been designed and implemented to have menu-based interface, so it is very convenient to users. © IFIP International Federation for Information Processing 2004.

Cite

CITATION STYLE

APA

Kil, M. W., Kim, S. J., Kwon, Y., & Lee, G. (2004). Network intrusion protection system using rule-based DB and RBAC policy. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3222, 670–675. https://doi.org/10.1007/978-3-540-30141-7_97

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free