DocumentCode :
565078
Title :
Intrusion Detection Parameterization Exchange data model
Author :
Bösch, Björn-C
Author_Institution :
Dept. of Comput. Sci., Carl-von-Ossietzky Univ., Oldenburg, Germany
fYear :
2012
fDate :
21-25 May 2012
Firstpage :
1490
Lastpage :
1495
Abstract :
The efficiency of Intrusion Detection Systems depends on their configuration. This configuration is currently vendor-specific. Operations could become complex when multiple systems are used. I briefly discuss why current management protocols are not adequate to manage Intrusion Detection Systems and what is needed to manage Intrusion Detection Systems adequate.
Keywords :
computer network security; local area networks; protocols; IETF; Snort; central operations LAN; host based IDS Samhain; intrusion detection message exchange format; intrusion detection parameterization exchange data model; intrusion detection parameterization exchange format; intrusion detection systems; management protocols; parameterization Web frontend; vendor-specific configuration; Intrusion detection; Monitoring; Protocols; Usability; XML;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MIPRO, 2012 Proceedings of the 35th International Convention
Conference_Location :
Opatija
Print_ISBN :
978-1-4673-2577-6
Type :
conf
Filename :
6240888
Link To Document :
بازگشت