{"title":"实时网络攻击监控工具概述","authors":"M. Baykara, Ugur Gurturk, Resul Das","doi":"10.1109/ISDFS.2018.8355339","DOIUrl":null,"url":null,"abstract":"Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An overview of monitoring tools for real-time cyber-attacks\",\"authors\":\"M. Baykara, Ugur Gurturk, Resul Das\",\"doi\":\"10.1109/ISDFS.2018.8355339\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.\",\"PeriodicalId\":154279,\"journal\":{\"name\":\"2018 6th International Symposium on Digital Forensic and Security (ISDFS)\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 6th International Symposium on Digital Forensic and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2018.8355339\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2018.8355339","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An overview of monitoring tools for real-time cyber-attacks
Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.