The Study of Security Devices Log Correlation Rules Base on ArcSight Platform - A Case Study of Active Attacks
碩士 === 華梵大學 === 資訊管理學系碩士班 === 104 === With the development of information technology, security attacks have increased in the past few decades; thus, companies have introduced security devices to lower the risk of attacks. However, numerous security attacks generate numerous logs and it becomes diffi...
Main Authors: | CHANG, WEN-TING, 張雯婷 |
---|---|
Other Authors: | CHU, HUEI-CHUNG |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/qt46vg |
Similar Items
-
Optimal short-sighted rules
by: Sacha eBourgeois-Gironde
Published: (2012-09-01) -
Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
by: Chung-Cheng Lee, et al.
Published: (2009) -
Detecting Network Attack Events and Establishing SIEM Correlation Rules
by: Ming-Chih Chien, et al.
Published: (2019) -
Security and Privacy in Mobile Devices: Novel Attacks and Countermeasures
Published: (2018) -
LogWheels: A Security Log Visualizer
by: Egeland, Vegard
Published: (2011)