期刊文献+

基于事件流的网络安全事件监控系统 被引量:5

Network Security Event Monitor Based on Event Stream System
原文传递
导出
摘要 随着网络攻击的频繁出现,使得人们对网络安全实时监控的需求日益迫切,而如何快速高效地处理大量安全事件是监控的关键之一。将事件流技术应用到网络安全事件处理中,提出了一种监控系统框架模型,在该模型系统中,基于EQL接口语言的规则引擎管理事件流,可有效支持对高速大规模网络事件实时分析,并保证基于其上的事件监控系统能够高效运行。 Complex and various network attacks have occurred frequently, thus the people begin to realize the importance of real-time supervision on the network security. The event-stream technology is applied to process the security events, and the framework model of security supervision system is designed. This system has the function of immediately collecting and parsing alert events from different network security devices when some attacks occur suddenly, meanwhile, in this model system, the EQL interface language-based rule engine is used to manage the event-stream, this could effectively support the real-time query and analysis on large-scale network events.
出处 《信息安全与通信保密》 2010年第2期92-94,共3页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(批准号:60772098) 教育部新世纪优秀人才支持计划项目(NCET-06-0393) 上海市曙光计划项目 863计划(基于攻击图及博弈理论的安全事件处理关键技术及系统)
关键词 规则引擎 Esper 网络安全事件 监控系统 rule engine Esper network security event supervision system
  • 相关文献

参考文献7

二级参考文献19

  • 1邢戈,张玉清,冯登国.网络安全管理平台研究[J].计算机工程,2004,30(10):129-131. 被引量:31
  • 2[1]Valdes A,Skinner K.Probabilistic Alert Correlation[A].Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001)[C],2001:54-68
  • 3[2]Dain O,Cunningham R K.Fusing a Heterogeneous Alert Stream into Scenarios[A].Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications[C],2001:1-13
  • 4[3]Debar H,WespiA.Aggregation and Correlation of Intrusion-Detection Alerts.In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection(RAID).2001.number 2212 in Lecture Notes in Computer Sciences,pages 85-103,Davis,CA,USA,October 2001.Springer
  • 5[4]Guofei Jiang,Member,IEEE and George Cybenko,Fellow,IEEE.temporal and Spatial distributed Event correlation for Network Security.Proceeding of the 2004 American Control conference Boston,Massachusetts June 30.July2,2004
  • 6[5]Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts.presented at Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22 2002,Washington,DC,United States,2002
  • 7[6]Ning P,Xu D.Learning attack strategies from intrusion alerts.presented at Proceedings of the 10th ACM Conference on Computer and Communications Security,CCS 2003,Oct 27-31 2003,Washington,DC,United States,2003
  • 8[7]Ning P,Cui Y Reeves D S,et al.D.Xu,Techniques and tools for analyzing intrusion alerts.ACM Transactions on Information and System Security,2004;7:274
  • 9[8]Ning P,Xu D.Alert correlation through triggering events and common resources.Tucson,AZ,USA,2004
  • 10[9]Jakobson G,Lemmon A,Weissman M.Knowledge-based GUI for network surveillance and fault analysis.presented at Proceedings of NOMS '94-IEEE Network Operations and Management Symposium,14-18 Feb.1994,Kissimmee,FL,USA,1994

共引文献19

同被引文献48

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部