DocumentCode
3220714
Title
The security operations center based on correlation analysis
Author
Yuan, Shuhong ; Zou, Chijia
Author_Institution
Inf. Center, Zhejiang Univ., Hangzhou, China
fYear
2011
fDate
27-29 May 2011
Firstpage
334
Lastpage
337
Abstract
With the development of the information technology, the network threats are rampant day by day. In order to protect company and organization network, They have deployed a variety of network security products, such as IDS (intrusion detection system), firewalls, VPN and AVS (anti-virus system). Because of the lack of data exchange mechanism, security product cannot share the security information each other and causes the large volume of alarm message or false alarm. In this case, we need a platform or system to solve this problem The security operations center can collect and manage these security events and analyzes the related information, can reduce the false positives and false negatives, and improve security of network system. In this paper, we do some research on the event correlation analysis, introduce the processes of the analysis and the method of rule extraction, and then introduce the system architecture of security operations center.
Keywords
authorisation; computer network security; data mining; virtual private networks; IDS; VPN; alarm message; antivirus system; company network protection; event correlation analysis; false alarm; false negatives; false positives; firewall; information technology; intrusion detection system; network security; network threat; organization network protection; rule extraction; security event collection; security event management; security information analysis; security operations center; system architecture; Association rules; Correlation; Filtering; Fires; Intrusion detection; Correlation analysis; Network security; Rule extraction;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location
Xi´an
Print_ISBN
978-1-61284-485-5
Type
conf
DOI
10.1109/ICCSN.2011.6013727
Filename
6013727
Link To Document