Evaluating the Observability of Network Security Monitoring Strategies With TOMATO

Monitoring systems for malicious behavior increasingly requires aggregating and analyzing data from various sources, such as network flows, host logs, and end-point monitoring platforms. However, there's currently a lack of metrics and methodologies to compute the observability and efficiency o...

Full description

Bibliographic Details
Main Authors: James Halvorsen, Jesse Waite, Adam Hahn
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8788508/