A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. This defense layer includes intrusion detection and prevention systems for host...
Հիմնական հեղինակներ: | , |
---|---|
Ձևաչափ: | Հոդված |
Լեզու: | English |
Հրապարակվել է: |
Dalat University
2018-07-01
|
Շարք: | Tạp chí Khoa học Đại học Đà Lạt |
Խորագրեր: | |
Առցանց հասանելիություն: | http://tckh.dlu.edu.vn/index.php/tckhdhdl/article/view/405 |