Abstract
SLA and LAC are the solutions developed by IFInet to better analyze firewalls logs and monitor network accesses respectively. SLA collects the logs generated by several firewalls and consolidates them; by means of SLA all the logs are analyzed, catalogued and related based on rules and algorithms defined by IFInet. LAC allows IFInet to identify and isolate devices that access to a LAN in an unauthorized manner, its operation is totally non-intrusive and its installation does not require any change neither to the structure of the network nor to single hosts that compose it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abad, C., Taylor, J., Sengul, C., Yurcik, W., Zhou, Y., Rowe, K.: Log correlation for intrusion detection: a proof of concept. In: Proc. 19th Annual Computer Security Applications Conference, pp. 255–264. IEEE Press, New York (2003)
Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 202–215. IEEE Press, New York (2002)
Debar, H., Wespi, A.: Aggregation and Correlation of Intrusion-Detection Alerts. In: Proc. 4th Int. Symp. Recent Advances in Intrusion Detection, RAID 2001, pp. 85–103. Springer, Berlin (2001)
Corchado, E., Herrero, A., Sáiz, J.M.: Detecting compounded anomalous SNMP situations using cooperative unsupervised pattern recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadrożny, S. (eds.) ICANN 2005. LNCS, vol. 3697, pp. 905–910. Springer, Heidelberg (2005)
Herrero, A., Corchado, E., Gastaldo, P., Zunino, R.: A comparison of neural projection techniques applied to Intrusion Detection Systems. In: Sandoval, F., Gonzalez Prieto, A., Cabestany, J., Graña, M. (eds.) IWANN 2007. LNCS, vol. 4507, pp. 1138–1146. Springer, Heidelberg (2007)
Ridella, S., Rovetta, S., Zunino, R.: Circular back-propagation networks for classification. IEEE Trans. on Neural Networks 8, 84–97 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Giacometti, B. (2009). SLA and LAC: New Solutions for Security Monitoring in the Enterprise. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, Á. (eds) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08. Advances in Soft Computing, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88181-0_40
Download citation
DOI: https://doi.org/10.1007/978-3-540-88181-0_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88180-3
Online ISBN: 978-3-540-88181-0
eBook Packages: EngineeringEngineering (R0)