LaPadula, 2000 - Google Patents
CyberSecurity Monitoring Tools and ProjectsLaPadula, 2000
View PDF- Document ID
- 2699683062351465683
- Author
- LaPadula L
- Publication year
External Links
Snippet
A couple of years ago, I started collecting information about intrusion detection tools and projects. After a while, I noticed that I was including tools that were not inherently intrusion detection tools because they were closely related to intrusion management in one form or …
- 238000001514 detection method 0 abstract description 191
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Caswell et al. | Snort intrusion detection and prevention toolkit | |
Kent et al. | Guide to computer security log management | |
Cohen | Information system attacks: A preliminary classification scheme | |
US7398389B2 (en) | Kernel-based network security infrastructure | |
Zamboni | Using internal sensors for computer intrusion detection | |
US20090271863A1 (en) | Identifying unauthorized privilege escalations | |
US20040098623A1 (en) | Intrusion detection system | |
Longstaff et al. | Security of the Internet | |
Safford et al. | The TAMU security package: An ongoing response to internet intruders in an academic environment | |
Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
Kurundkar et al. | Network intrusion detection using Snort | |
Fry et al. | Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks | |
Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
Jha et al. | Building agents for rule-based intrusion detection system | |
Kent et al. | Sp 800-92. guide to computer security log management | |
LaPadula | State of the art in anomaly detection and reaction | |
Kishore et al. | Intrusion detection system a need | |
LaPadula | CyberSecurity Monitoring Tools and Projects | |
LaPadula | MP 99B0000018R1 | |
Yüksel | Experimenting, threat detection and SIEM integration with custom created honeypots | |
Toth | Improving Intrusion Detection Systems | |
Hajdarevic | Cyber Security Audit in Business Environments | |
Heikkinen | Information Security Case Study with Security Onion at Kajaani UAS Datacentre Laboratory | |
Yu | TRINETR: an intrusion detection alert management and analysis system | |
Patel | Importance of Intrusion Detection System on Different Intrusion Attacks |