Incident Reaction Based on Intrusion Detections’ Alert Analysis
| dc.contributor.author | Heigl, Michael | |
| dc.contributor.author | Doerr, Laurin | |
| dc.contributor.author | Almaini, Amar | |
| dc.contributor.author | Fiala, Dalibor | |
| dc.contributor.author | Schram, Martin | |
| dc.contributor.editor | Pinker, Jiří | |
| dc.date.accessioned | 2019-10-17T09:14:09Z | |
| dc.date.available | 2019-10-17T09:14:09Z | |
| dc.date.issued | 2018 | |
| dc.description.abstract-translated | The protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as a fundamental part in holistic security eco-systems in the previous years. However, the interpretation of and reaction on detected incidents is still a challenging task. In this paper an incident handling environment with relevant components and exemplary functionality is proposed that involves the processes from the detection of incidents over their analysis to the execution of appropriate reactions. An evaluation of a selection of implemented interacting components using technology such as OpenFlow or Snort generally proofs the concept. | en |
| dc.format | 6 s. | cs |
| dc.format.mimetype | application/pdf | |
| dc.identifier.citation | 2018 International Conference on Applied Electronics: Pilsen, 11th – 12th September 2018, Czech Republic, 45-50. | en |
| dc.identifier.isbn | 978–80–261–0721–7 | |
| dc.identifier.issn | 1803–7232 | |
| dc.identifier.uri | http://hdl.handle.net/11025/35468 | |
| dc.language.iso | en | en |
| dc.publisher | Západočeská univerzita v Plzni | cs |
| dc.rights | © Západočeská univerzita v Plzni | cs |
| dc.rights.access | openAccess | en |
| dc.subject | korelace | cs |
| dc.subject | kryptografie | cs |
| dc.subject | detekce narušení | cs |
| dc.subject | plánování | cs |
| dc.subject | extrakce funkcí | cs |
| dc.subject | analýza úkolů | cs |
| dc.subject.translated | correlation | en |
| dc.subject.translated | cryptography | en |
| dc.subject.translated | intrusion detection | en |
| dc.subject.translated | planning | en |
| dc.subject.translated | feature extraction | en |
| dc.subject.translated | task analysis | en |
| dc.title | Incident Reaction Based on Intrusion Detections’ Alert Analysis | en |
| dc.type | konferenční příspěvek | cs |
| dc.type | conferenceObject | en |
| dc.type.status | Peer-reviewed | en |
| dc.type.version | publishedVersion | en |
Files
Original bundle
1 - 1 out of 1 results
No Thumbnail Available
- Name:
- Heigl.pdf
- Size:
- 1018.67 KB
- Format:
- Adobe Portable Document Format
- Description:
- Plný text
License bundle
1 - 1 out of 1 results
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: