A Case Study on Converged Security with Event Correlation of Physical and Information Security

التفاصيل البيبلوغرافية
العنوان: A Case Study on Converged Security with Event Correlation of Physical and Information Security
المؤلفون: Jinoh Kim, Koohong Kang
المصدر: International Journal of Security and Its Applications. 9:77-94
بيانات النشر: NADIA, 2015.
سنة النشر: 2015
مصطلحات موضوعية: Engineering, Cloud computing security, General Computer Science, business.industry, Computer security model, Computer security, computer.software_genre, Security testing, Security information and event management, Security service, Security through obscurity, Security convergence, business, computer, Physical security
الوصف: Today’s security initiatives have encouraged incorporation of physical security and information security into converged security for greater effectiveness and capabilities. However, efforts for converging security have largely limited to the issues of the organizational structure with respect to streamlining processes and abstract frameworks for security management. To go beyond just a buzz word of converged security, it should be necessary to bring significant technical merits from this convergence. In this work, we consider “event correlations” that examine any associations between events coming from the above two distinctive worlds to provide greater capabilities for preventing unauthorized access to high-security computers, as a tangible step towards convergence of security. For this purpose, we introduce our approach using event categorization that maps physical events to a finite number of classes (five) instead of considering event types individually for feasibility, and also show how to define correlation rules with the categories. In addition, we present our prototype system that implements the incorporation of two typical physical security entities: a door/gate access control and a video surveillance system. Our exploration presented in this paper would be beneficial for guiding future development of a diverse range of converged security functions.
تدمد: 1738-9976
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::c011ef2c1f5c34cce2bf9833f79139c2
https://doi.org/10.14257/ijsia.2015.9.9.08
حقوق: OPEN
رقم الأكسشن: edsair.doi...........c011ef2c1f5c34cce2bf9833f79139c2
قاعدة البيانات: OpenAIRE