Determining threat level associated with network activity

作者: Robert T. Hughes , Iven Connary , Matthew F. Caldwell , Darin J. Buck

DOI:

关键词:

摘要: Network devices such as intrusion detection systems, routers, firewalls, servers, and other network are monitored to aggregate all event data generated by provide a threat ranking of activity. A level for given host is determined weighting assigned that host's netblock. In addition, vulnerability the event's destination associated with value indexed type.

参考文章(15)
Bryan Douglas Williams, Timothy P. Farley, Philip Charles Brass, Derek John Mezack, George C. Young, John M. Hammer, Method and System for Managing Computer Security Information ,(2001)
Alfred Huger, Elias Levy, Oliver Friedrichs, George Tomic, Early warning system for network attacks ,(2002)
Keith Haycock, Conrad Herrmann, Anthony Albert, Kyle Kawamura, System and methodology for security policy arbitration ,(2002)
Jeffrey D. Hodges, Intrusion threat detection ,(2001)
Steven C. Black, John Michael Garrison, Herve Debar, RoseAnne Swart, Method and apparatus in a data processing system for managing situations from correlated events ,(2001)
R.F. Erbacher, K.L. Walker, D.A. Frincke, Intrusion and misuse detection in large-scale systems IEEE Computer Graphics and Applications. ,vol. 22, pp. 38- 47 ,(2002) , 10.1109/38.974517
Nong Ye, Xiangyang Li, Qiang Chen, S.M. Emran, Mingming Xu, Probabilistic techniques for intrusion detection based on computer audit data systems man and cybernetics. ,vol. 31, pp. 266- 274 ,(2001) , 10.1109/3468.935043
Ronald W. Walker, Milan V. Trcka, Mark R. Jones, Kenneth T. Fallon, Network security and surveillance system ,(1997)
Marshall A. Beddoe, George Kurtz, Stuart C. McClure, David M. Cole, Robin Keir, Christopher M. Prosise, Michael J. Morton, Christopher Abad, System and method for network vulnerability detection and reporting ,(2012)