Article details

Title: Security Monitoring of Company Networks
Author(s): Victor-Valeriu Patriciu   Iustin Priescu   Sebastian Nicolăescu         

Abstract: A significant number of high profile cases of malicious software threats and incidents that have dominated media reporting for years have served to raise awareness and determine most businesses to invest time and resources into defending against this prevalent security issue. Security monitoring has gained support being regarded as an essential component for managing and improving the security of network infrastructures. The primary goal of a security monitoring system is to help identify suspicious events on a network that may indicate malicious activity or procedural errors. This paper presents the major security monitoring types in current enterprise networked environments.

Keywords: information security, security vulnerability, security monitoring.

References:
[1] V.V. PATRICIU, I. PRIESCU, S. NICOLĂESCU – Security Monitoring: An Advanced Tactic for Network Security Management, Proc. of the 6th International Conference “Communications 2006”, pp. 439-442, Bucharest, Romania, Jun. 8-10, 2006
[2] R. BEJTLICH – The TAO of Network Security Monitoring: Beyond Intrusion Detection, Addison-Wesley, Boston, MA, 2005
[3] M.G. SOLOMON, M. CHAPPLE – Information Security Illuminated, Jones and Bartlett Publishers, Sudbury, MA, 2005
[4] XYPRO Technology Corporation – HP NonStop Server Security: A Practical Handbook, Elsevier Digital Press, Burlington, MA, 2004
[5] A. BUECKER, H.H. FULDA, D. RIEXINGER – Deployment Guide Series: IBM Tivoli Security Compliance Manager, IBM Redbooks, 2005
[6] B. WOTRING – Host Integrity Monitoring Using Osiris and Samhain, Syngress Publishing, Rockland, MA, 2005
[7] POSITIF Project (Policy-based Security Tools and Framework), European Commission, http://www.positif.org/
[8] OSSIM Project (Open Source Security Information Management), http://www.ossim.net/
[9] B. SCHNEIER – Managed Security Monitoring: Network Security for the 21st Century, Counterpane Internet Security, 2005, http://www.counterpane.com/ msm.pdf