References:
1. Dhiren & Maulik, Hardik Joshi, Bhadresh K,Patel, “Towards Application Classification with vulnerability signature for IDS/IPS”,SecurIT’12,Augest,17-19,2019,Kollam,Kerala,India.
2. Preeti Raman, Hilmi Güneş Kayacık, and Anil Somayaji
3. System for detecting insider attackers. The proposed system is based on assigning grades and privilege levels to users and August 6, 2017.
4. Salem, B.M., Heshkop, S., and Stolfo, S.J. 2020. A survey of insider attack detection eesearch. Insider Attack and Cyber Security- Beyond the Hacker, Springer.
5. wedgenetworks http://www.wedgenetworks.com/resources/ technology/deep-content-inspection-with-wedgeos.html.
6. Erez Shmuelia,c, Tamir Tassab,c, Raz Wassersteina, Bracha Shapiraa, Lior Rokach, Limiting Disclosure of Sensitive Data in Sequential Releases of Databases,2017s
7. Mun, H., Han, K., Yeun, C.Y., and Kim, K. 2018. Yet another intrusion detection system against Insider Attacks. Proceedings, Symposium on Cryptography and Information Security .
8. Mohammad A. Faysel , and Syed S. Haque Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems ,July 2018
9. SearchSecurity, http://searchsecurity.techtarget.com/definition/ security-information-and-event-management-SIEM.