TAILIEUCHUNG - Resource-Aware Multi-Format Network Security Data Storage

Once your computer is connected to the internet, it’s also connected to millions of other connected computers, which could, in turn, allow attackers to connect to your computer. Information flows from the internet to your home network by first coming into your modem, then to your router, which most people have, and finally to your computer. Because your modem doesn’t have security settings, it’s crucial to secure your router—the first securable device that receives information from the internet. Be sure to secure it before you connect to the internet to improve your computer’s security. If you don’t have a router,. | Resource-Aware Multi-Format Network Security Data Storage Evan Cooke Andrew Myrick David Rusek Farnam Jahanian Department of Electrical Engineering and Computer Science University of Michigan emcooke andrewmy rusekd farnam @ ABSTRACT Internet security systems like intrusion detection and intrusion prevention systems are based on a simple input-output principle they receive a high-bandwidth stream of input data and produce summaries of suspicious events. This simple model has serious drawbacks including the inability to attach context to security alerts a lack of detailed historical information for anomaly detection baselines and a lack of detailed forensics information. Together these problems highlight a need for fine-grained security data in the shortterm and coarse-grained security data in the long-term. To address these limitations we propose resource-aware multiformat security data storage. Our approach is to develop an architecture for recording different granularities of security data simultaneously. To explore this idea we present a novel framework for analyzing security data as a spectrum of information and a set of algorithms for collecting and storing multi-format data. We construct a prototype system and deploy it on darknets at academic Fortune 100 enterprise and ISP networks. We demonstrate how a hybrid algorithm that provides guarantees on time and space satisfies the short and long-term goals across a four month deployment period and during a series of large-scale denial of service attacks. Categories and Subject Descriptors Computer-Communication Networks Network Operations General Terms Measurement Security Darknet Keywords Anomaly Detection Anomaly Classification Network-Wide Traffic Analysis Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.