Learn More
Some heterogeneous security equipments such as firewalls, intrusion detection systems, and anti-virus gateways, can produce massive security events which are difficult to manage efficiently. So a log-based mining, distributed, and multi-protocol supported framework of security monitoring system is proposed. This paper describes the architecture of the(More)
with the rapid development of Internet, more and more enterprises, research and finance institutions connect their databases to the Internet for resource sharing. However, due to developers' technical may be uneven, or they does not take security considerations into account, web applications become vulnerable to the attacks, thus the network databases will(More)
  • 1