Log analysis based mechanism for network security incidents identification

msra(2007)

引用 22|浏览21
暂无评分
摘要
The increasing use and importance that networks have acquired in today's economics and social context also brought an increase in the number of malicious activities that violate privacy and security policies of institutional networks. There are several approaches that aim to detect such activities, for instance the usage of intrusion detection systems. The goal of this paper is to present an alternative malicious activity detection approach based on querying and correlation of the events registered in system logs. The purpose of this approach is to identify the hosts causing such malicious activities. Experiments carried at the Brazilian National Research and Educational Network's Point of Presence at State of Pará have showed that this proposal was able to detect the hosts responsible for malicious activities accurately and demanding low computational resources.
更多
查看译文
关键词
network management,system logs.,network security,security policy,intrusion detection system,point of presence,social context
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要