Title
Analysis and Management of Intrusion Data Collection
Abstract
This paper expands upon our prior work [2] to examine the different data sources available for analysis in the identification of intrusions and misuses. Subsequently, we examine the different mechanisms by which data can be collected and the potential impacts this may have on the effectiveness of the analysis algorithms. Additionally, we examine the performance implications of such a data collection paradigm as is incorporated in our prior work Examination and analysis of these performance impact results will aid determination of the most appropriate level of monitoring for a given environment or system. The goal is to identify information that must be collected everywhere versus that which should only be collected on critical systems and servers. By better arming systems and network administrators with the appropriate information they can make more adequate choices of their monitoring requirements and notify users of expected impacts and ramifications.
Year
Venue
Keywords
2004
SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT
intrusion data,security management,performance metrics
Field
DocType
Citations 
Data collection,Intrusion,Computer science,As is,Server,Database
Conference
0
PageRank 
References 
Authors
0.34
5
1
Name
Order
Citations
PageRank
Robert F. Erbacher120227.65