Real time internal intrusion detection: A case study of embedded sensors and detectors in e-government websites

Zuhoor Al-Khanjari*, Asaad Abdulrahman Nayyef

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.

Original languageEnglish
Title of host publicationHandbook of Research on Threat Detection and Countermeasures in Network Security
PublisherIGI Global
Pages48-65
Number of pages18
ISBN (Electronic)9781466665842
ISBN (Print)1466665831, 9781466665835
DOIs
Publication statusPublished - Oct 31 2014

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Real time internal intrusion detection: A case study of embedded sensors and detectors in e-government websites'. Together they form a unique fingerprint.

Cite this