Visible to the public Integrating visual analysis of network security and management of detection system configurations

TitleIntegrating visual analysis of network security and management of detection system configurations
Publication TypeConference Paper
Year of Publication2017
AuthorsHellmann, B., Ahlers, V., Rodosek, G. D.
Conference Name2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
ISBN Number978-1-5386-0697-1
KeywordsCollaboration, Communication networks, Configuration Management, Data models, Databases, Intrusion detection, Intrusion Detection Systems, Monitoring, Network security, policy evaluation, policy-based governance, pubcrawl, Security Policies Analysis, Security Visualization, visualization
Abstract

A problem in managing the ever growing computer networks nowadays is the analysis of events detected by intrusion detection systems and the classification whether an event was correctly detected or not. When a false positive is detected by the user, changes to the configuration must be made and evaluated before they can be adopted to productive use. This paper describes an approach for a visual analysis framework that integrates the monitoring and analysis of events and the resulting changes on the configuration of detection systems after finding false alarms, together with a preliminary simulation and evaluation of the changes.

URLhttps://ieeexplore.ieee.org/document/8095240/
DOI10.1109/IDAACS.2017.8095240
Citation Keyhellmann_integrating_2017