作者: Robert T. Hughes , Iven Connary , Matthew F. Caldwell , Darin J. Buck
DOI:
关键词:
摘要: Network devices such as intrusion detection systems, routers, firewalls, servers, and other network are monitored to aggregate all event data generated by provide a threat ranking of activity. A level for given host is determined weighting assigned that host's netblock. In addition, vulnerability the event's destination associated with value indexed type.