Categorizing Computing Assets According to Communication Patterns

In today's dynamic information society, organizations critically depend on the underlying computing infrastructure. Tracking computing devices as assets and their usage helps in the provision and maintenance of an efficient, optimized service. A precise understanding of the operational infrastructure and its users also plays a key role during the negotiation of outsourcing contracts and for planning mergers and acquisitions. Building an accurate inventory of computing assets is especially difficult in unknown heterogeneous systems and networking environments without prior device instrumentation. User mobility and mobile, not-always-signed-on, computing devices add to the challenge. We propose to complement basic network-based discovery techniques with the combined log information from network and application servers to compute an aggregate picture of assets, and to categorize their usage with data-mining techniques according to detected communication patterns.

[1]  Bill Cheswick,et al.  What Can You Do with Traceroute? , 2001, IEEE Internet Comput..

[2]  S. Hadjiefthymiades,et al.  Hypertext Transfer Protocol (HTTP) , 1996 .

[3]  Jeffrey D. Case,et al.  Simple network management protocol , 1995 .

[4]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[5]  M. Filoni Computing assets categorization according to collected configuration and usage information , 2001 .

[6]  Jaideep Srivastava,et al.  Grouping Web page references into transactions for mining World Wide Web browsing patterns , 1997, Proceedings 1997 IEEE Knowledge and Data Engineering Exchange Workshop.

[7]  Robbie Allen,et al.  Active Directory , 2018, Windows PowerShell 5 und PowerShell 7.

[8]  Luca Deri,et al.  Ntop: Beyond ping and traceroute , 1999, DSOM.

[9]  James E. Pitkow,et al.  In Search of Reliable Usage Data on the WWW , 1997, Comput. Networks.

[10]  Luca Deri,et al.  Effective traffic measurement using ntop , 2000 .

[11]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1990, RFC.

[12]  Luca Deri,et al.  Ntop: a Lightweight Open-Source Network IDS , 2000 .

[13]  Philip S. Yu,et al.  Data mining for path traversal patterns in a web environment , 1996, Proceedings of 16th International Conference on Distributed Computing Systems.

[14]  Jon Postel,et al.  Simple Mail Transfer Protocol , 1981, RFC.

[15]  Robert Denn,et al.  Windows 2000 Active Directory , 2000 .

[16]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[17]  Drew Heywood Networking with Microsoft TCP/IP , 1996 .

[18]  Kevin Richards Network based intrusion detection: A review of technologies , 1999, Comput. Secur..