Process query systems for network security monitoring

被引:3
作者
Berk, V [1 ]
Fox, N [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IV, Pts 1 and 2 | 2005年 / 5778卷
关键词
D O I
10.1117/12.609855
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper we present the architecture of our network security monitoring infrastructure based on a Process Query System (PQS). PQS offers a new and powerful way of efficiently processing data streams, based on process descriptions that are submitted as queries. In this case the data streams are familiar network sensors, such as Snort, Netfilter, and Tripwire. The process queries describe the dynamics of network attacks and failures, such as worms, multistage attacks, and router failures. Using PQS the task of monitoring enterprise class networks is simplified, offering a priority-based GUI to the security administrator that clearly outlines events that require immediate attention. The PQS-Net system is deployed on an unsecured production network; the system has successfully detected many diverse attacks and failures.
引用
收藏
页码:520 / 530
页数:11
相关论文
共 50 条
  • [41] Radiological monitoring network for homeland security.
    Sanderson, CG
    Latner, N
    Chiu, NC
    Albert, BJ
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2003, 226 : U72 - U72
  • [42] Directions in Network-Based Security Monitoring
    Porras, Phillip
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 82 - 85
  • [43] Network traffic analysis and security monitoring with UniMon
    Erhard, W
    Gutzmann, MM
    Libati, HM
    ATM 2000: PROCEEDINGS OF THE IEEE CONFERENCE 2000 ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2000, : 439 - 446
  • [44] Heterogeneous Network Security Effective Monitoring Method
    Kalashnikov, A. O.
    Anikina, E., V
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2019), 2019, 1141 : 625 - 635
  • [45] System and Network Security: Anomaly Detection and Monitoring
    Vadursi, Michele
    Ceccarelli, Andrea
    Duarte, Elias P., Jr.
    Mahanti, Aniket
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)
  • [46] Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Blake, Errol A.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (04) : 77 - 106
  • [47] Improved Security Monitoring Method for Network Bordary
    Gao, Liting
    Wang, Lixia
    Wang, Zhenyan
    Qi, Aihua
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [48] Managed security monitoring: Network security for the 21st century
    Schneier, B.
    Computer Security Journal, 2001, 17 (02): : 1 - 12
  • [49] Managed security monitoring: Network security for the 21st century
    Schneier, B
    COMPUTERS & SECURITY, 2001, 20 (06) : 491 - 503
  • [50] Data Auditing for Intelligent Network Security Monitoring
    Hong, SeukGue
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 74 - 79