Title :
Network auditing: issues and recommendations
Author :
Schaen, Samuel I. ; McKenney, Brian W.
Author_Institution :
Mitre Corp., McLean, VA, USA
Abstract :
Auditing can be used to detect abuse or intrusion into a computer system in some cases or if the abuse or intrusion is discovered by other means, the audit can be used after-the-fact to help determine the amount of damage that has occurred on the system. The deterrent presented by the audit trail is also important. In the past, audit trails have usually been oriented to standalone processors. The paper explores issues present when auditing in a networked environment. The issues are grouped according to: collection and storage, integration, protection and analysis. Some recommendations for further research, development, standards and policy-making initiatives are provided
Keywords :
auditing; network operating systems; security of data; audit trail; auditing; computer system; intrusion; networked environment; policy-making; standards; Communication system control; Drives; Information analysis; Information security; Information systems; Intelligent networks; Intrusion detection; Protection; Standards activities; US Department of Defense;
Conference_Titel :
Computer Security Applications Conference, 1991. Proceedings., Seventh Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-2280-6
DOI :
10.1109/CSAC.1991.213017