About the application of signature analysis method in the siem-systems
Main Article Content
Abstract
In this article analyzes the problem is the quantity of information processed and the need to use for this purpose SIEM systems. Consideres assignatures methods which are used in such systems. The procedure of use of SIEM system on the basis of signature methods is analyzes. The example of operation of the counter of ground system for detection of DDoS of attack is given.
Article Details
Section
MATHEMATICAL METHODS IN INFORMATION SECURITY