Uma Proposta para a Identificação de Atividades Maliciosas em Arquivos de Log

Weverton CordeiroVanner VasconcellosAntônio Abelém

The increasing use and importance that networks have acquired in today’s economics and social context also brought an increase in the number of malicious activities that violate privacy and security policies of institutional networks. There are several approaches that aim to detect such activities, for instance the usage of intrusion detection systems. The goal of this paper is to present an alternative malicious activity detection approach based on querying and correlation of the events registered in system logs.The purpose of this approach is to identify the hosts causing such malicious activities.

Caso o link acima esteja inválido, faça uma busca pelo texto completo na Web: Buscar na Web

Biblioteca Digital Brasileira de Computação - Contato:
     Mantida por: