{"title":"企业网络中变更事件的高效可视化","authors":"Andrew Stewart","doi":"10.1109/SECCOMW.2006.359582","DOIUrl":null,"url":null,"abstract":"Change is a crucial property from a security perspective. The detection of change underpins many of the operational security activities that organizations typically carry out. For example, the essence of security monitoring is to detect changes, then analyze those changes in the context of the applicable security policy. Security tools are available to perform change detection at a host level. Such tools typically employ a local software agent, and identify changes that occur in the filesystem of the host. We describe a tool that performs a similar role in a network environment. The tool employs a variety of visualization techniques to efficiently communicate changes that occur in enterprise networks","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Efficient visualization of change events in enterprise networks\",\"authors\":\"Andrew Stewart\",\"doi\":\"10.1109/SECCOMW.2006.359582\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Change is a crucial property from a security perspective. The detection of change underpins many of the operational security activities that organizations typically carry out. For example, the essence of security monitoring is to detect changes, then analyze those changes in the context of the applicable security policy. Security tools are available to perform change detection at a host level. Such tools typically employ a local software agent, and identify changes that occur in the filesystem of the host. We describe a tool that performs a similar role in a network environment. The tool employs a variety of visualization techniques to efficiently communicate changes that occur in enterprise networks\",\"PeriodicalId\":156828,\"journal\":{\"name\":\"2006 Securecomm and Workshops\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Securecomm and Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECCOMW.2006.359582\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Securecomm and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCOMW.2006.359582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient visualization of change events in enterprise networks
Change is a crucial property from a security perspective. The detection of change underpins many of the operational security activities that organizations typically carry out. For example, the essence of security monitoring is to detect changes, then analyze those changes in the context of the applicable security policy. Security tools are available to perform change detection at a host level. Such tools typically employ a local software agent, and identify changes that occur in the filesystem of the host. We describe a tool that performs a similar role in a network environment. The tool employs a variety of visualization techniques to efficiently communicate changes that occur in enterprise networks