[go: up one dir, main page]

Christianson et al. - Google Patents

SnortCM: AN APPROACH TO CENTRALIZED INTRUSION DETECTION MANAGEMENT

Christianson et al.

View PDF
Document ID
4273472846891951131
Author
Christianson A
Rogness N
Roth W
Walton J
Penaloza M

External Links

Snippet

As the Internet grows, the demand for security related products become more important every day. Several products have recently become available to aid security professionals in tracking, analyzing, and preventing attacks. Among the more popular of these security tools …
Continue reading at www.micsymposium.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
JP6894003B2 (en) Defense against APT attacks
US8640234B2 (en) Method and apparatus for predictive and actual intrusion detection on a network
Bace et al. Intrusion detection systems
US20100199345A1 (en) Method and System for Providing Remote Protection of Web Servers
US20100192201A1 (en) Method and Apparatus for Excessive Access Rate Detection
Miloslavskaya Security operations centers for information security incident management
Kurundkar et al. Network intrusion detection using Snort
Efe et al. Comparison of the host based intrusion detection systems and network based intrusion detection systems
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
CN118138293A (en) Water conservancy key information infrastructure network security situation perception platform
Maddhi et al. Safeguarding Log Data Integrity: Employing DES Encryption Against Manipulation Attempts
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Benzekri et al. Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations
Raut Log based intrusion detection system
Navin et al. A survey on intrusion detection system
Cisco Introduction
Kishore et al. Intrusion detection system a need
AT&T
Alim et al. IDSUDA: An Intrusion Detection System Using Distributed Agents
Gong Intrusion detection model based on security knowledge in online network courses
Ahmed et al. MICIE: a model for identifying and collecting intrusion evidences
Bedwell Finding a new approach to SIEM to suit the SME environment
Christianson et al. SnortCM: AN APPROACH TO CENTRALIZED INTRUSION DETECTION MANAGEMENT
Singh et al. A review on intrusion detection system
Majid Building a firewall and intrusion detection system dased network security system using opnsense tools