Home // ICIMP 2015, The Tenth International Conference on Internet Monitoring and Protection // View article
Effective Security Monitoring Through System Recognition
Authors:
Felix von Eye
Keywords: security monitoring; network security; security management; proactive scan; netflows; flow records.
Abstract:
The bottleneck of security monitoring is often the huge amount of signatures, which are useless but consumes computation power and time. Therefore, the signatures has to be set more accurate for the systems, which should be protected. In this paper, a new approach is presented, which is able to detect more efficient the service and software running on a server. This knowledge helps to select the relevant signatures for the security monitoring, which leads to a more efficient usage of the system resources.
Pages: 8 to 11
Copyright: Copyright (c) IARIA, 2015
Publication date: June 21, 2015
Published in: conference
ISSN: 2308-3980
ISBN: 978-1-61208-413-8
Location: Brussels, Belgium
Dates: from June 21, 2015 to June 26, 2015