Models and issues in data stream systems
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Extracting an Entity Relationship Schema from a Relational Database through Reverse Engineering
ER '94 Proceedings of the13th International Conference on the Entity-Relationship Approach
Gigascope: a stream database for network applications
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
TelegraphCQ: continuous dataflow processing
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Sketching streams through the net: distributed approximate query tracking
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Mapping maintenance for data integration systems
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Interactive schema translation with instance-level mappings
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Declarative Network Monitoring with an Underprovisioned Query Processor
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Communication-efficient distributed monitoring of thresholded counts
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Autograph: toward automated, distributed worm signature detection
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Detecting Broken Mappings for Deep Web Integration
SKG '07 Proceedings of the Third International Conference on Semantics, Knowledge and Grid
Query rewriting and answering under constraints in data integration systems
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Hi-index | 0.00 |
Computer networks have become ubiquitous and integral part of the nation's critical infrastructure. How to grasp the real-time overall situation of the network security is very noteworthy to study. Current network security systems make great contributions in enhancing the network security. Nevertheless, these products are independent and autonomous, so they fail to share the results of the detected attacks. Consequently, such solutions cannot figure out an overview of the network security situation. In another perspective, building a new global monitoring system from scratch will suffer from redundant construction, more cost, and longer deploying time. To address the dilemma, we propose a novel solution called GS-TMS which reuses the log data generated by the existing widely-spread security systems. By introducing the data stream and data integration technologies, GS-TMS provides a desirable capability of quickly building a large-scale distributed network monitoring system. Furthermore, GS-TMS has additional notable advantages over current monitoring systems in scalability and flexibility.