Session information message exchange format |
 |
In today’s network environment, computer networks are vulnerable to threats from both inside and outside the organization. The firewall systems log session information about selected incoming and outgoing transmission control protocol/Internet protocol (TCP/IP) connections.
However, those systems that are currently available are not generally interoperable because each system has its own special functionality, control mechanisms and session log formats.
The need most security administrators face today is the maintaining of consistent session information exchange format across diverse firewall systems and even varied infrastructures.
Recommendation ITU-T X.1542 describes the information model for the session information message exchange format (SIMEF) and provides an associated data model specified with extensible markup language (XML) schema. The SIMEF defines a data model representation for sharing the transport layer session log information regarding the centralized network security management and security information exchange system. The specification of any transport protocol is beyond the scope of this Recommendation
|
|
Citation: |
https://handle.itu.int/11.1002/1000/12852 |
Series title: |
X series: Data networks, open system communications and security X.1500-X.1599: Cybersecurity information exchange X.1540-X.1549: Event/incident/heuristics exchange |
Approval date: |
2016-09-07 |
Provisional name: | X.simef |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1542 (09/2016)
|
In force
|
here
|
here
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|