首页> 外文会议>International Conference on Telecommunication Systems: Modeling and Analysis; 20031002-05; Monterey,CA(US) >Selecting Log Data Sources to Correlate Attack Traces for Computer Network Security: Preliminary Results
【24h】

Selecting Log Data Sources to Correlate Attack Traces for Computer Network Security: Preliminary Results

机译:选择日志数据源以关联攻击跟踪以提高计算机网络安全性:初步结果

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

The success of intrusion detection systems is dependent upon the data they process. In this paper, we consider different audit logs as data sources in order to make decisions about which subset of logs to use for intrusion detection. We evaluate different logs as intrusion detection data sources given different attacks and propose two distinct categories of logs (system and network) that can provide complete and complementary coverage of attacks from start to finish. We end by reporting preliminary results from experiments based on log correlation and visualization of logs.
机译:入侵检测系统的成功取决于它们处理的数据。在本文中,我们将不同的审核日志视为数据源,以便决定将哪些日志子集用于入侵检测。我们将不同的日志评估为受到不同攻击的入侵检测数据源,并提出两种截然不同的日志类别(系统和网络),它们可以从头到尾提供完整而互补的攻击范围。我们首先报告基于日志相关性和日志可视化的实验初步结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号