Date Added: Jan 2012
The omnipresence of the computer system tools intensified every year in all companies. They integrate equipments, data and services that constitute a wealth to protect. Lot of mechanisms has been developed to assure the computer systems security. Conventional intrusions detection systems "IDS" have shown their insufficiencies and limits. To improve computer systems security approach, in the authors' previous papers, they have proposed an exact algorithm for the deployment of security policies for single computer systems and an enhanced three levels security policy for complex computer systems, However, manual analysis of the huge volume of data generated, audit data, is usually impractical.