Investigation on effective solutions against insider attacks (B)
Insider Attacks (IAs) can be defined as an attack or intrusion that is performed from the internal boundaries of the network. While Intrusion Detection Systems (IDS) devices are placed strategically in the network to detect external intrusions, the same cannot be said for internal intrusions like IA...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/77389 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Be the first to leave a comment!