[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

LaPadula, 2000 - Google Patents

CyberSecurity Monitoring Tools and Projects

LaPadula, 2000

View PDF
Document ID
2699683062351465683
Author
LaPadula L
Publication year

External Links

Snippet

A couple of years ago, I started collecting information about intrusion detection tools and projects. After a while, I noticed that I was including tools that were not inherently intrusion detection tools because they were closely related to intrusion management in one form or …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Caswell et al. Snort intrusion detection and prevention toolkit
Kent et al. Guide to computer security log management
Cohen Information system attacks: A preliminary classification scheme
US7398389B2 (en) Kernel-based network security infrastructure
Zamboni Using internal sensors for computer intrusion detection
US20090271863A1 (en) Identifying unauthorized privilege escalations
US20040098623A1 (en) Intrusion detection system
Longstaff et al. Security of the Internet
Safford et al. The TAMU security package: An ongoing response to internet intruders in an academic environment
Kim et al. DSS for computer security incident response applying CBR and collaborative response
Kurundkar et al. Network intrusion detection using Snort
Fry et al. Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Jha et al. Building agents for rule-based intrusion detection system
Kent et al. Sp 800-92. guide to computer security log management
LaPadula State of the art in anomaly detection and reaction
Kishore et al. Intrusion detection system a need
LaPadula CyberSecurity Monitoring Tools and Projects
LaPadula MP 99B0000018R1
Yüksel Experimenting, threat detection and SIEM integration with custom created honeypots
Toth Improving Intrusion Detection Systems
Hajdarevic Cyber Security Audit in Business Environments
Heikkinen Information Security Case Study with Security Onion at Kajaani UAS Datacentre Laboratory
Yu TRINETR: an intrusion detection alert management and analysis system
Patel Importance of Intrusion Detection System on Different Intrusion Attacks