Home // ICIMP 2015, The Tenth International Conference on Internet Monitoring and Protection // View article


Effective Security Monitoring Through System Recognition

Authors:
Felix von Eye

Keywords: security monitoring; network security; security management; proactive scan; netflows; flow records.

Abstract:
The bottleneck of security monitoring is often the huge amount of signatures, which are useless but consumes computation power and time. Therefore, the signatures has to be set more accurate for the systems, which should be protected. In this paper, a new approach is presented, which is able to detect more efficient the service and software running on a server. This knowledge helps to select the relevant signatures for the security monitoring, which leads to a more efficient usage of the system resources.

Pages: 8 to 11

Copyright: Copyright (c) IARIA, 2015

Publication date: June 21, 2015

Published in: conference

ISSN: 2308-3980

ISBN: 978-1-61208-413-8

Location: Brussels, Belgium

Dates: from June 21, 2015 to June 26, 2015