On the Three Levels Security Policy Comparison Between SVM and Decision Trees

The omnipresence of the computer system tools intensified every year in all companies. They integrate equipments, data and services that constitute a wealth to protect. Lot of mechanisms has been developed to assure the computer systems security. Conventional intrusions detection systems "IDS" have shown their insufficiencies and limits. To improve computer systems security approach, in the authors' previous papers, they have proposed an exact algorithm for the deployment of security policies for single computer systems and an enhanced three levels security policy for complex computer systems, However, manual analysis of the huge volume of data generated, audit data, is usually impractical.

Provided by: Journal of Theoretical and Applied Information Technology Topic: Security Date Added: Jan 2012 Format: PDF

Find By Topic