Tài liệu tham khảo |
Loại |
Chi tiết |
[1] K. Kent and M. Souppaya, “Guide to Computer Security Log Management,” Nist Spec. Publ., 2006 |
Sách, tạp chí |
Tiêu đề: |
Guide to Computer Security LogManagement |
|
[2] S. D. Security, “The Key to Cyber Threat Detection,” 2015 |
Sách, tạp chí |
Tiêu đề: |
The Key to Cyber Threat Detection |
|
[3] J. Creasey, “Cyber Security Monitoring and Logging Guide,” p. 60, 2015 |
Sách, tạp chí |
Tiêu đề: |
Cyber Security Monitoring and Logging Guide |
|
[4] A. Taylor, “Continuous Monitoring: Build A World Class Monitoring System for Enterprise, Small Office, or Home,” p. 26, 2016 |
Sách, tạp chí |
Tiêu đề: |
Continuous Monitoring: Build A World Class MonitoringSystem for Enterprise, Small Office, or Home |
|
[5] B. Voss, “Information Security Reading Room,” Sans Inst.(Information Sceurity Read. Room), vol. 3, no. 2, pp. 2–6, 2019 |
Sách, tạp chí |
Tiêu đề: |
Information Security Reading Room |
|
[6] S. He, J. Zhu, P. He, and M. R. Lyu, “Experience Report: System Log Analysis for Anomaly Detection,” Proc. - Int. Symp. Softw. Reliab. Eng.ISSRE, pp. 207–218, 2016 |
Sách, tạp chí |
Tiêu đề: |
Experience Report: System LogAnalysis for Anomaly Detection |
|
[7] C. Brodie, “Information Security Reading Room The Importance of Security,” 2019 |
Sách, tạp chí |
Tiêu đề: |
Information Security Reading Room The Importance ofSecurity |
|
[8] S. Alspaugh et al., “Analyzing Log Analysis: An Empirical Study of User Log Mining,” Proc. Large Install. Syst. Adm. Conf., pp. 62–77, 2014 |
Sách, tạp chí |
Tiêu đề: |
Analyzing Log Analysis: An Empirical Study ofUser Log Mining |
|
[9] S. Borso, “Information Security Reading Room Automating Open Source Security : A SANS Review of A SANS Review of WhiteSource,”2019 |
Sách, tạp chí |
Tiêu đề: |
Information Security Reading Room Automating OpenSource Security : A SANS Review of A SANS Review of WhiteSource |
|
[10] P. Manev, “SELKS5 RC1 - Threat Hunting and more...,”https://www.stamus- networks.com/blog/2018/12/21/se, 2020. . [11] Elastic, “logstash,” https://www.elastic.co/logstash, 2020 |
Sách, tạp chí |
Tiêu đề: |
SELKS5 RC1 - Threat Hunting and more...,”https://www.stamus- networks.com/blog/2018/12/21/se, 2020. .[11] Elastic, “logstash |
|