翻訳と辞書
Words near each other
・ Luanzhou
・ Luanzhou Mining
・ Luapula Province
・ Luapula Province border dispute
・ Luapula River
・ Luar Batang Mosque
・ Luar na Lubre
・ Luara Hayrapetyan
・ Luaras
・ Luarasi University
・ Luarca
・ Luarca CF
・ Luard
・ Luard Islands
・ Luarica diamond mine
LUARM
・ Luarsab
・ Luarsab (given name)
・ Luarsab I of Kartli
・ Luarsab II of Kartli
・ Luart, North Carolina
・ Luas
・ Luasamotu
・ Luashia
・ Luaspis
・ Luatangi Vatuvei
・ LuaTeX
・ Luatuanu'u
・ Luau
・ Luau (disambiguation)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

LUARM : ウィキペディア英語版
LUARM

== The LUARM audit engine ==
LUARM〔(The LUARM project page at Sourceforge.net ).〕 (Logging User Actions in Relational Mode) is an Open Source experimental audit engine〔Bace R. (2000), “Intrusion Detection”, First Edition, Macmillan Technical Publishing, Indianapolis, USA, ISBN 1-57870-185-6: Chapter 3 discusses audit records and engines in detail〕 that facilitates insider threat specification as well as user action computer forensic functionality for the Linux operating system. It is designed to log in detail user activities into a simple Relational Database Management System (RDBMS) schema. MySQL is used for the relational backend although the schema could be easily converted to PostgreSQL and other popular relational databases. LUARM is written in Perl and provides a near real-time snapshot of file access, process/program execution and network endpoint user activities〔Magklaras G., Furnell S. (2005), “A Preliminary Model of End User Sophistication for Insider Threat Prediction in IT Systems”, Computers & Security, Volume 24, Issue 5, August 2005, Pages 371-380.〕 organized in well-defined relational table formats. The purposes are:
:
* To assist system administrators and data security officers in the process of detecting and preventing external and internal threats to Linux based devices.
:
* To provide a well defined easy-to-parse audit record structure, as well as scalable and reliable storage for the logged data.
:
* Since the logged data are stored away from the monitored linux devices, LUARM can act as a valuable complement to existing data forensic investigation tools. This is because it is immune to the “observer effect” and the dangers of “static” forensic analysis: dynamic information about file, network and process activity is not lost and examining/logging data does not affect the source media state〔Hay B., Nance K., Bishop M. (2009), “Live Analysis Progress and Challenges”, IEEE Security & Privacy, Volume 7, Number 2, pages 30-37.〕).
LUARM is being developed at the Center for Security Communications and Network Research, University of Plymouth, UK. It is part of a wider Insider Misuse research effort targeting insider misuse threat specification.〔Book Chapter: Insider Threat Specification as a Threat Mitigation Technique, Advances in Information Security, Vol 49: Title: Insider Threats in Cyber Security, Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.) 2010, XII, 244 p. 40 illus., 20 in color., ISBN 978-1-4419-7132-6, Hardcover, Springer 2010.〕

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「LUARM」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.