Incident Reaction Based on Intrusion Detections’ Alert Analysis

dc.contributor.authorHeigl, Michael
dc.contributor.authorDoerr, Laurin
dc.contributor.authorAlmaini, Amar
dc.contributor.authorFiala, Dalibor
dc.contributor.authorSchram, Martin
dc.contributor.editorPinker, Jiří
dc.date.accessioned2019-10-17T09:14:09Z
dc.date.available2019-10-17T09:14:09Z
dc.date.issued2018
dc.description.abstract-translatedThe protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as a fundamental part in holistic security eco-systems in the previous years. However, the interpretation of and reaction on detected incidents is still a challenging task. In this paper an incident handling environment with relevant components and exemplary functionality is proposed that involves the processes from the detection of incidents over their analysis to the execution of appropriate reactions. An evaluation of a selection of implemented interacting components using technology such as OpenFlow or Snort generally proofs the concept.en
dc.format6 s.cs
dc.format.mimetypeapplication/pdf
dc.identifier.citation2018 International Conference on Applied Electronics: Pilsen, 11th – 12th September 2018, Czech Republic, 45-50.en
dc.identifier.isbn978–80–261–0721–7
dc.identifier.issn1803–7232
dc.identifier.urihttp://hdl.handle.net/11025/35468
dc.language.isoenen
dc.publisherZápadočeská univerzita v Plznics
dc.rights© Západočeská univerzita v Plznics
dc.rights.accessopenAccessen
dc.subjectkorelacecs
dc.subjectkryptografiecs
dc.subjectdetekce narušenícs
dc.subjectplánovánícs
dc.subjectextrakce funkcícs
dc.subjectanalýza úkolůcs
dc.subject.translatedcorrelationen
dc.subject.translatedcryptographyen
dc.subject.translatedintrusion detectionen
dc.subject.translatedplanningen
dc.subject.translatedfeature extractionen
dc.subject.translatedtask analysisen
dc.titleIncident Reaction Based on Intrusion Detections’ Alert Analysisen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen

Files

Original bundle
Showing 1 - 1 out of 1 results
No Thumbnail Available
Name:
Heigl.pdf
Size:
1018.67 KB
Format:
Adobe Portable Document Format
Description:
Plný text
License bundle
Showing 1 - 1 out of 1 results
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: