首页> 外文会议>International Conference on Internet Monitoring and Protection >Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
【24h】

Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs

机译:基于最佳实践和Windows事件日志,使用妥协指标的入侵检测

获取原文

摘要

Nowadays computer attacks and intrusions have become more common affecting confidentiality, integrity or the availability of computer systems. They are more sophisticated making the job of the information security analysts more complicated, mainly because of the attacking vectors are more robust and complex to identify. One of the main resources that information security people have on their disposition are Indicators of Compromise (IOCs), which allow the identification of potentially malicious activity on a system or network. Usually IOCs are made off virus signatures, IP addresses, URLs or domains and some others elements, which are not sufficient to detect an intrusion or malicious activity on a computer system. The Windows event logs register different activities in a Windows operating system that are valuable elements in a forensic analysis process. IOCs can be generated using Windows event logs for intrusion detection, improving Incident Response (IR) and forensic analysis processes. This paper presents a procedure to generate IOCs using Windows event logs to achieve a more efficient diagnostic computer system for IR.
机译:如今,计算机攻击和入侵已经变得更加常见,影响计算机系统的机密性,完整性或可用性。他们更复杂,使信息安全分析师的工作更加复杂,主要是因为攻击矢量更加强大,复杂以识别。信息安全人士对其处置的主要资源之一是妥协(IOC)的指标,其允许在系统或网络上识别潜在的恶意活动。通常,IOC是从病毒签名,IP地址,URL或域以及一些其他元素中进行的,这些元素不足以检测计算机系统上的入侵或恶意活动。 Windows事件日志在Foreensic分析过程中注册了在Windows操作系统中的不同活动,该系统是取证分析过程中的宝贵元素。可以使用Windows事件日志生成IOC以进行入侵检测,改进事件响应(IR)和法医分析过程。本文介绍了使用Windows事件日志生成IOC的过程,以实现更高效的IR诊断计算机系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号