A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
How to exchange security events? Overview and evaluation of formats and protocols
2015
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the occurrence of anomalous events as a proactive service. In this paper we provide a structured
doi:10.1109/inm.2015.7140300
dblp:conf/im/SteinbergerSGB15
fatcat:57jujctbxvcwddvvrnb76u4yyi