Study on data acquisition solution of network security monitoring system

@article{Gao2010StudyOD,
  title={Study on data acquisition solution of network security monitoring system},
  author={Kunlun Gao and Jianming Liu and Jian Xin Guo and Rui An},
  journal={2010 IEEE International Conference on Information Theory and Information Security},
  year={2010},
  pages={674-677}
}
With the demands for network security, some heterogeneous security equipments such as firewalls, intrusion detection systems, and anti-virus gateways are widely deployed in network, and produce massive security events which need to be merged and analyzed. Therefore, a distributed and multi-protocol supported network security monitoring system is proposed. The paper describes the architecture of the network security monitoring system. Focusing on the system acquisition layer, two methods are… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-8 OF 8 REFERENCES

Research and application of asynchronous message transmission on JMS

Pengwei Zhang, Jingxia Chen
  • 2nd International Conference on Computer Engineering and Technology,
  • 2010
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Information Security Monitoring System Based on Data Mining

  • 2009 Fifth International Conference on Information Assurance and Security
  • 2009
VIEW 1 EXCERPT

Integrating enterprise application using message-oriented middleware and J2EE technologies

  • 2006 International Conference on Computing & Informatics
  • 2006
VIEW 1 EXCERPT

Security Operation Center Design Based on Radial Basis Function Neural Network

Niu Yi, Zheng Qi-Lun, Peng Hong
  • Pre-proceedings of the International Conference BioInspired Computing Theory and Applications,Wuhan,
  • 2006
VIEW 1 EXCERPT

Security Operation Center Concepts & Implementation

Renaud Bidou
  • http://www.iv2-technologies.com/~rbidou/SOCConceptAnd Implementation.pdf, August
  • 2005
VIEW 1 EXCERPT

Towards informatic analysis of syslogs

  • 2004 IEEE International Conference on Cluster Computing (IEEE Cat. No.04EX935)
  • 2004
VIEW 1 EXCERPT

Network intrusion early warning model based on D-S evidence theory

  • Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693)
  • 2003
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…