Intrusion Detection System for Denial of Service Attack using Performance Signature

KIPS Transactions on Software and Data Engineering, Vol. 6, No. 11, pp. 3011-3019, Nov. 1999
10.3745/KIPSTE.1999.6.11.3011, Full Text:


Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RABC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is need that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article
[IEEE Style]
K. D. Kim and S. H. Lee, "Intrusion Detection System for Denial of Service Attack using Performance Signature," KIPS Journal (1994 ~ 2000), vol. 6, no. 11, pp. 3011-3019, 1999. DOI: 10.3745/KIPSTE.1999.6.11.3011.

[ACM Style]
Kwang Deuk Kim and Sang Ho Lee. 1999. Intrusion Detection System for Denial of Service Attack using Performance Signature. KIPS Journal (1994 ~ 2000), 6, 11, (1999), 3011-3019. DOI: 10.3745/KIPSTE.1999.6.11.3011.