Christianson et al. - Google Patents
SnortCM: AN APPROACH TO CENTRALIZED INTRUSION DETECTION MANAGEMENTChristianson et al.
View PDF- Document ID
- 4273472846891951131
- Author
- Christianson A
- Rogness N
- Roth W
- Walton J
- Penaloza M
External Links
Snippet
As the Internet grows, the demand for security related products become more important every day. Several products have recently become available to aid security professionals in tracking, analyzing, and preventing attacks. Among the more popular of these security tools …
- 238000001514 detection method 0 title abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6894003B2 (en) | Defense against APT attacks | |
US8640234B2 (en) | Method and apparatus for predictive and actual intrusion detection on a network | |
Bace et al. | Intrusion detection systems | |
US20100199345A1 (en) | Method and System for Providing Remote Protection of Web Servers | |
US20100192201A1 (en) | Method and Apparatus for Excessive Access Rate Detection | |
Miloslavskaya | Security operations centers for information security incident management | |
Kurundkar et al. | Network intrusion detection using Snort | |
Efe et al. | Comparison of the host based intrusion detection systems and network based intrusion detection systems | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
CN118138293A (en) | Water conservancy key information infrastructure network security situation perception platform | |
Maddhi et al. | Safeguarding Log Data Integrity: Employing DES Encryption Against Manipulation Attempts | |
Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
Benzekri et al. | Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations | |
Raut | Log based intrusion detection system | |
Navin et al. | A survey on intrusion detection system | |
Cisco | Introduction | |
Kishore et al. | Intrusion detection system a need | |
AT&T | ||
Alim et al. | IDSUDA: An Intrusion Detection System Using Distributed Agents | |
Gong | Intrusion detection model based on security knowledge in online network courses | |
Ahmed et al. | MICIE: a model for identifying and collecting intrusion evidences | |
Bedwell | Finding a new approach to SIEM to suit the SME environment | |
Christianson et al. | SnortCM: AN APPROACH TO CENTRALIZED INTRUSION DETECTION MANAGEMENT | |
Singh et al. | A review on intrusion detection system | |
Majid | Building a firewall and intrusion detection system dased network security system using opnsense tools |