Proceedings of the Symposium on Network and Distributed System Security
DOI: 10.1109/ndss.1995.390641
|View full text |Cite
|
Sign up to set email alerts
|

Distributed audit trail analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…Performance testing of the log monitoring solution must be tested before implementation [17] to provide feedback on how the log management acts under stress that the FIM will bring. The network environment, topology, and structure in which the log management solution will be deployed within should be considered [17].…”
Section: Combining Fim With Logging Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Performance testing of the log monitoring solution must be tested before implementation [17] to provide feedback on how the log management acts under stress that the FIM will bring. The network environment, topology, and structure in which the log management solution will be deployed within should be considered [17].…”
Section: Combining Fim With Logging Solutionsmentioning
confidence: 99%
“…The network environment, topology, and structure in which the log management solution will be deployed within should be considered [17]. This is to ensure that enough hardware space is allocated for logs that are retrieved from computer sources.…”
Section: Combining Fim With Logging Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Misuse detection models the patterns of known attacks or vulnerabilities, and identifies actions that conform to such patterns as attacks. Existing approaches include rule-based methods (e.g., ASAX [26], P-BEST [25]), state transition based methods [5], [14], and data mining approaches [22], [23]. Most of these techniques cannot be directly applied to sensor networks due to the resource constraints on sensor nodes.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…As organizations grow into larger virtual organizations, more points of vulnerability emerge and attackers can carry out more widely distributed forms of attack. Traditional means of distributed audit cannot be used within virtual organizations due to concerns over both log privacy and the safety of centralizing sensitive data storage [22]. The fact that two organizations are willing to cooperate for the purpose of carrying out a particular type of interaction does not, and should not, imply that they completely trust one another.…”
Section: Introductionmentioning
confidence: 99%