The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan.-Feb. (2013 vol.11)
pp: 36-43
Lukasz Kufel , Poznan University of Technology
Today, organizations depend much more on IT than they did in the past. Services such as internal portals, email communication, and financial and HR systems rely on computers to move businesses forward. These systems are under pressure to be securer than ever to protect organizations' operational environment. One aspect to consider in this situation is IT security event management. This article presents the design and implementation of two security event monitoring approaches in a distributed systems environment.
Monitoring, Computer security, Distributed processing, Servers, Software engineering, Information technology, Event detection, events monitoring, security events, distributed systems, monitoring on demand
Lukasz Kufel, "Security Event Monitoring in a Distributed Systems Environment", IEEE Security & Privacy, vol.11, no. 1, pp. 36-43, Jan.-Feb. 2013, doi:10.1109/MSP.2012.61
1. N. Delgado, A. Quiroz Gates,, and S. Roach, “A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools,” IEEE Trans. Software Eng., vol. 30, no. 12, 2004, pp. 859–872.
2. B. Ravindran, “Engineering Dynamic Real-Time Distributed Systems: Architecture System Description, Language, and Middleware,” IEEE Trans. Software Eng., vol. 28, no. 1, 2002, pp. 30–57.
3. M. Nicolett and K.M. Kavanagh, Magic Quadrant for Security Information and Event Management, Gartner, May 2011.
4. W.N. Robinson, “A Requirements Monitoring Framework for Enterprise Systems,” Requirements Eng., vol. 11, no. 1, 2006, pp. 17–41.
5. C.-G. Guo, X.-L. Li, and J. Zhu, “A Generic Model for Software Monitoring Techniques and Tools,” Proc. 2nd Int'l Conf. Networks Security Wireless Communications and Trusted Computing (NSWCTC 10), IEEE CS, 2010, pp. 61–64.
6. K. Kent and M. Souppaya, Guide to Computer Security Log Management, US Nat'l Inst. Standards and Technology, Sept. 2006; 800-92SP800-92.pdf.
7. N.R. Jennings, “On Agent-Based Software Engineering,” Artificial Intelligence, vol. 117, no. 2, 2000, pp. 277–296.
8. R. Govindu and R.B. Chinnam, “MASCF: A Generic Process-Centered Methodological Framework for Analysis and Design of Multi-agent Supply Chain Systems,” Computers and Industrial Eng., vol. 53, no. 4, 2007, pp. 584–609.
9. R. Subramanyan, J. Miguel-Alonso, and J. Fortes, Design and Evaluation of a SNMP-Based Monitoring System for Heterogeneous, Distributed Computing, tech. report TR-ECE 00-11, School of Electrical and Computer Eng., Purdue Univ., July 2000.
10. C.M. Dobre et al., “An Agent Based Framework to Monitor and Control High Performance Data Transfers,” Int'l Conf. Computer as a Tool (EUROCON 07), IEEE CS, 2007, pp. 453–458.
11. C.C. Hayes, “Agents in a Nutshell—A Very Brief Introduction,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 1, 1999, pp. 127–132.
12. P. Bellavista, A. Corradi, and C. Stefanelli, “Java for On-Line Distributed Monitoring of Heterogeneous Systems and Services,” Computer J., vol. 45, no. 6, 2002, pp. 595–607.
13. T. Azemoon et al., “Real-Time Data Access Monitoring in Distributed, Multipetabyte Systems,” Int'l Conf. Computing in High Energy and Nuclear Physics, Journal of Physics: Conference Series 119, 2008.
14. M. Diaz, G. Juanole, and J.-P. Courtiat, “Observer—A Concept for Formal On-Line Validation of Distributed Systems,” IEEE Trans. Software Eng., vol. 20, no. 12, 1994, pp. 900–913.
15. M. Zulkernine, R.E. Seviora, “A Compositional Approach to Monitoring Distributed Systems,” Proc. Int'l Conf. Dependable Systems and Networks, IEEE CS, 2002, pp. 763–772.
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool