Di Sarno et al., 2011 - Google Patents
D5. 1.4-Resilient SIEM Framework Architecture, Services and ProtocolsDi Sarno et al., 2011
View PDF- Document ID
- 13438125507878449608
- Author
- Di Sarno C
- Mazzeo A
- Mazzocca N
- Rieke R
- Rodrigues P
- Romano L
- Verissimo P
- Vial E
- Publication year
External Links
Snippet
Executive Summary Security Information and Event Management (SIEM) systems are being employed by organizations to facilitate operations related to maintenance, monitoring and analysis of networks and their nodes, by collecting and allowing the correlation of thousands …
- 238000000034 method 0 abstract description 93
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
- H04L41/0654—Network fault recovery
- H04L41/0659—Network fault recovery by isolating the faulty entity
- H04L41/0663—Network fault recovery by isolating the faulty entity involving offline failover planning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2097—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements maintaining the standby controller/processing unit updated
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/04—Architectural aspects of network management arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Scott-Hayward et al. | A survey of security in software defined networks | |
| US10230745B2 (en) | Using high-interaction networks for targeted threat intelligence | |
| Paxson et al. | Experiences with NIMI | |
| Hussein et al. | Software-Defined Networking (SDN): the security review | |
| Zeng et al. | Computer operating system logging and security issues: a survey | |
| Garcia et al. | SieveQ: A layered bft protection system for critical services | |
| Tseng et al. | A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking | |
| Xiao et al. | GlobalView: building global view with log files in a distributed/networked system for accountability | |
| Mahmood et al. | Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments | |
| Di Sarno et al. | D5. 1.4-Resilient SIEM Framework Architecture, Services and Protocols | |
| Al Ayoubi et al. | Centralized management of ble-basedota firmware updates: Design and prototype implementation | |
| Kruegel | Network alertness: towards an adaptive, collaborating intrusion detection system | |
| Garg et al. | Anatomy of IoT Botnets and Detection Methods | |
| Di Sarno et al. | D5. 1.2-Preliminary Defense Services and Protocols | |
| Schölzel et al. | A viable SIEM approach for Android | |
| Schiller et al. | Computer Science Review | |
| Michaud | Malicious use of omg data distribution service (dds) in real-time mission critical distributed systems | |
| Zhou et al. | $ D^{2} $ FL: Design and Implementation of Distributed Dynamic Fault Localization | |
| Xiao et al. | P-accountability: A quantitative study of accountability in networked systems | |
| Mirdita | Breaking it down, to build it back up: Attacks and Defenses for RPKI | |
| Lucena | GIP-a node gossip protocol for gateway integrity checking in industrial IoT environments | |
| Pritz | Shell activity logging and auditing in exercise environments of security Lectures using OSS | |
| Mosby | A Blockchain-Based Anomalous Detection System for Internet of Things Devices | |
| Giacobbe et al. | Key challenges in LoRaWAN-based Edge-Cloud infrastructures for security-sensitive smart cities applications. | |
| Mohammed | A reference model for securing IoT. |