This research effort identifies attributes of distributed event correlation which make it desirable for security event detection, and evaluates those attributes in a comparison with a centralized alternative. Event correlation is an effective means of detecting complex situations encountered in information technology environments. Centralized, database-driven log event correlation is more commonly implemented, but suffers from flaws such as high network bandwidth utilization, significant requir…
This research effort identifies attributes of distributed event correlation which make it desirable for security event detection, and evaluates those attributes in a comparison with a centralized alternative. Event correlation is an effective means of detecting complex situations encountered in information technology environments. Centralized, database-driven log event correlation is more commonly implemented, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This analysis measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation of multiple log sources. These capabilities produce a configuration which allows a 99% reduction of network syslog traffic in the low-accountability case, and a significant decrease in database execution time through context-addition in the high-accountability case.
This research effort identifies attributes of distributed event correlation which make it desirable for security event detection, and evaluates those attributes in a comparison with a centralized alternative. Event correlation is an effective means of detecting complex situations encountered in information technology environments. Centralized, database-driven log event correlation is more commonly implemented, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This analysis measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation of multiple log sources. These capabilities produce a configuration which allows a 99% reduction of network syslog traffic in the low-accountability case, and a significant decrease in database execution time through context-addition in the high-accountability case.
Reviews
No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
Price guarantee
Bookbook.eu guarantees the best price for items marked with the “Price Guarantee” badge. If an identical item costs less at another online store, we will refund the price difference. Prices are compared with the prices of items at the list of stores specified by bookbook.eu. Bookbook.eu undertakes to refund the price difference to the customer who applies under the conditions specified in the “Price Guarantee” rules. Learn more
E-book
22,39 €
ATTENTION!
This book is provided ACSM format. It is not suitable for standard reading devices that support EPUB or MOBI format e-books.
Important! It is not possible to download e-books when connecting from the United Kingdom.
This is a book being sold by a private person. After you pay for your order, the book seller will send it within 7 days . If the seller does not do this on time, the money will be refunded to you automatically.
The condition of this book has not been assessed by Bookbook.eu experts, so all responsibility for the stated book quality lies with the seller.
Would you also like to sell used books and earn money? Learn more here
Item successfully added to cart
Used book:
A used book sold directly from the Bookbook.eu warehouse. The book's quality has been assessed by Bookbook.eu experts.
Reviews