2014
DOI: 10.14257/ijsia.2014.8.5.37
|View full text |Cite
|
Sign up to set email alerts
|

Contextual Security with IF-MAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“… Log formats : To facilitate the correlation process and to offer a reliable automated event analysis, most researchers and security experts argue that vendors and producers should agree on the format and the syntax of security event records. For instance, the authors in (Lakbabi et al , 2014) propose to use the standard protocol IF-MAP to share in real-time security events between the central server and the security equipment in response to illegitimate activities. The main reason why the log format is a problem for the SIEM industry, is because each application (or source device) now has its own log file format that affects the quality of the analysis and the robustness of the correlation engine.…”
Section: Related Workmentioning
confidence: 99%
“… Log formats : To facilitate the correlation process and to offer a reliable automated event analysis, most researchers and security experts argue that vendors and producers should agree on the format and the syntax of security event records. For instance, the authors in (Lakbabi et al , 2014) propose to use the standard protocol IF-MAP to share in real-time security events between the central server and the security equipment in response to illegitimate activities. The main reason why the log format is a problem for the SIEM industry, is because each application (or source device) now has its own log file format that affects the quality of the analysis and the robustness of the correlation engine.…”
Section: Related Workmentioning
confidence: 99%