Dynamic management of inside threat monitoring system

被引:0
|
作者
Lu, Jun [1 ]
Liu, Daxin [1 ]
Chen, FangYuan [1 ]
Liu, GuoXian [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Peoples R China
来源
Information, Management and Algorithms, Vol II | 2007年
关键词
internal attack; agent; point to point;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic management mechanism can be applied to manage inside threat monitoring system. In the Agent-based Inside Threat Monitoring System with Dynamic Grading and Combination Hosts, it controls host computers to join and exit the network through management-tree. Compared to the centralized distributing control and graded distributing control, tree-form dynamic management mechanism has better agility and can avoid single computer fault. But the maintenance of the management tree by this method is great and its feasibility is not good. So inspection system based on point to point is advanced. This method have the excellence of the tree-form dynamic management mechanism, it can inspect distributly correlation threaten and reduce inspection complexity.
引用
收藏
页码:280 / 285
页数:6
相关论文
共 50 条
  • [21] A threat monitoring system for intelligent data analytics of network traffic
    Lucas C. B. Guimarães
    Gabriel Antonio F. Rebello
    Gustavo F. Camilo
    Lucas Airam C. de Souza
    Otto Carlos M. B. Duarte
    Annals of Telecommunications, 2022, 77 : 539 - 554
  • [22] A study on monitoring and protecting computer system against interception threat
    Cho, S
    Chang, C
    Kim, J
    Choi, J
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 96 - 105
  • [23] The threat is coming from inside the house
    Hickox, Annie
    PSYCHOLOGIST, 2021, 34 : 28 - 33
  • [24] Introduction to the inside the insider threat Minitrack
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2016, 2016-March
  • [25] A Streaming-Based Network Monitoring and Threat Detection System
    Chen, Zhijiang
    Zhang, Hanlin
    Hatcher, William G.
    Nguyen, James
    Yu, Wei
    2016 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2016, : 31 - 37
  • [26] Introduction to Inside the Insider Threat Minitrack
    Clark, Jason W.
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3200 - 3201
  • [27] A threat monitoring system for intelligent data analytics of network traffic
    Guimaraes, Lucas C. B.
    Rebello, Gabriel Antonio F.
    Camilo, Gustavo F.
    de Souza, Lucas Airam C.
    Duarte, Otto Carlos M. B.
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (7-8) : 539 - 554
  • [28] Electricity Monitoring System with Interchangeable Piezoelectric Energy Harvesters and Dynamic Power Management Circuitry
    Yang, Zongxian
    Zarabi, Sid
    Fernandes, Egon
    Rua, Isabel
    Debeda, Helene
    Salehian, Armaghan
    Nairn, David
    Wei, Lan
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO), 2018,
  • [29] Big Data Management System Security Threat Model
    Poltavtseva, M. A.
    Zegzhda, D. P.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 903 - 913
  • [30] Skade - A Challenge Management System for Cyber Threat Hunting
    Sommestad, Teodor
    Karlzen, Henrik
    Kvist, Hanna
    Gustafsson, Hanna
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I, 2024, 14398 : 84 - 103