Real time internal intrusion detection

A case study of embedded sensors and detectors in e-government websites

Zuhoor Al-Khanjari, Asaad Abdulrahman Nayyef

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.

Original languageEnglish
Title of host publicationHandbook of Research on Threat Detection and Countermeasures in Network Security
PublisherIGI Global
Pages48-65
Number of pages18
ISBN (Print)9781466665842, 1466665831, 9781466665835
DOIs
Publication statusPublished - Oct 31 2014

Fingerprint

Intrusion detection
Websites
Detectors
Sensors
Security of data
Acoustic waves

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Al-Khanjari, Z., & Nayyef, A. A. (2014). Real time internal intrusion detection: A case study of embedded sensors and detectors in e-government websites. In Handbook of Research on Threat Detection and Countermeasures in Network Security (pp. 48-65). IGI Global. https://doi.org/10.4018/978-1-4666-6583-5.ch004

Real time internal intrusion detection : A case study of embedded sensors and detectors in e-government websites. / Al-Khanjari, Zuhoor; Nayyef, Asaad Abdulrahman.

Handbook of Research on Threat Detection and Countermeasures in Network Security. IGI Global, 2014. p. 48-65.

Research output: Chapter in Book/Report/Conference proceedingChapter

Al-Khanjari, Z & Nayyef, AA 2014, Real time internal intrusion detection: A case study of embedded sensors and detectors in e-government websites. in Handbook of Research on Threat Detection and Countermeasures in Network Security. IGI Global, pp. 48-65. https://doi.org/10.4018/978-1-4666-6583-5.ch004
Al-Khanjari Z, Nayyef AA. Real time internal intrusion detection: A case study of embedded sensors and detectors in e-government websites. In Handbook of Research on Threat Detection and Countermeasures in Network Security. IGI Global. 2014. p. 48-65 https://doi.org/10.4018/978-1-4666-6583-5.ch004
Al-Khanjari, Zuhoor ; Nayyef, Asaad Abdulrahman. / Real time internal intrusion detection : A case study of embedded sensors and detectors in e-government websites. Handbook of Research on Threat Detection and Countermeasures in Network Security. IGI Global, 2014. pp. 48-65
@inbook{bd669e7144d540598be2c2aa2b9db08a,
title = "Real time internal intrusion detection: A case study of embedded sensors and detectors in e-government websites",
abstract = "The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.",
author = "Zuhoor Al-Khanjari and Nayyef, {Asaad Abdulrahman}",
year = "2014",
month = "10",
day = "31",
doi = "10.4018/978-1-4666-6583-5.ch004",
language = "English",
isbn = "9781466665842",
pages = "48--65",
booktitle = "Handbook of Research on Threat Detection and Countermeasures in Network Security",
publisher = "IGI Global",

}

TY - CHAP

T1 - Real time internal intrusion detection

T2 - A case study of embedded sensors and detectors in e-government websites

AU - Al-Khanjari, Zuhoor

AU - Nayyef, Asaad Abdulrahman

PY - 2014/10/31

Y1 - 2014/10/31

N2 - The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.

AB - The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.

UR - http://www.scopus.com/inward/record.url?scp=84945401519&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84945401519&partnerID=8YFLogxK

U2 - 10.4018/978-1-4666-6583-5.ch004

DO - 10.4018/978-1-4666-6583-5.ch004

M3 - Chapter

SN - 9781466665842

SN - 1466665831

SN - 9781466665835

SP - 48

EP - 65

BT - Handbook of Research on Threat Detection and Countermeasures in Network Security

PB - IGI Global

ER -