System and method for monitoring computing servers for possible unauthorized access

作者: Bryan Martin , Zhishen Liu , Qing Zhao

DOI:

关键词: Security policyComputer scienceComputer securitySet (abstract data type)Monitoring dataServerThreat level

摘要: A system is provided that includes one or more computing servers and a processing circuit for monitoring data transactions of the servers. Each configured to provide respective services remote users. The monitor at least servers, which associated with user account. security policy account set conditions are indicative unauthorized access when satisfied by various characteristics monitored data. determine threat level based on policy. In response exceeding first threshold indicated in account, sends notification an authorized

参考文章(37)
Vladimir Smelyansky, Victor Grinberg, Prevention of call loops for wholesale voip traffic termination ,(2014)
Hua Ouyang, Long'en Li, Yunwei Luo, Huahua Yin, Yi Lu, Qi Shi, Automatic Detection of Network Conditions Prior to Engaging in Online Activities ,(2013)
Kwang-Shan Pan, Sujin Catherine Chang, Derek Hisami Mitsumori, Voice over internet protocol (VoIP) network performance monitor ,(2002)
Emmanuel P. Tychon, L. Alexander Clemm, Autonomous performance probing ,(2011)
Kimmo Rantanen, Miguel-Angel Garcia-Martin, Veli-Pekka Heinonen, Call looping prevention ,(2001)
Chester Kustarz, Lawrence Bruce Huston, Kevin Russell Cline, Christopher R. Hand, Method and Protection System for Mitigating Slow HTTP Attacks Using Rate and Time Monitoring ,(2012)