A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

Detection of cyberattacks and anomalies in cyber-physical systems: Approaches, data sources, evaluation

O Tushkanova, D Levshun, A Branitskiy… - Algorithms, 2023 - mdpi.com
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and
therefore it is extremely important to detect them at early stages. However, there are several …

Intrusion detection in cloud computing based on time series anomalies utilizing machine learning

AR Al-Ghuwairi, Y Sharrab, D Al-Fraihat… - Journal of Cloud …, 2023 - Springer
The growth of cloud computing is hindered by concerns about privacy and security. Despite
the widespread use of network intrusion detection systems (NIDS), the issue of false …

A survey on intelligent management of alerts and incidents in IT services

Q Yu, N Zhao, M Li, Z Li, H Wang, W Zhang… - Journal of Network and …, 2024 - Elsevier
Modern service systems are constantly improving with the development of various IT
technologies, leading to a boost in system scales and complex dependencies among …

A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT

Y Liu, S Li, X Wang, L Xu - Computer Modeling in …, 2024 - digitalcommons.odu.edu
Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as
improved efficiency, smart analytics, and increased automation. However, it also exposes …

Anomaly based multi-stage attack detection method

W Ma, Y Hou, M Jin, P Jian - Plos one, 2024 - journals.plos.org
Multi-stage attacks are one of the most critical security threats in the current cyberspace. To
accurately identify multi-stage attacks, this paper proposes an anomaly-based multi-stage …

GraphWeaver: Billion-Scale Cybersecurity Incident Correlation

S Freitas, A Gharib - arXiv preprint arXiv:2406.01842, 2024 - arxiv.org
In the dynamic landscape of large enterprise cybersecurity, accurately and efficiently
correlating billions of security alerts into comprehensive incidents is a substantial challenge …

Machine Learning Based Primary User Emulation Attack Detection

MR Camana, CE Garcia, I Koo… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The rapidly growing demand for IoT applications requires the widespread use of cognitive
radio technologies. However, modern wireless communication systems have a large …

Application of Intelligent Methods of Correlation of System Events in Predictive Analysis of Security States of Objects of Critical Infrastructure

DA Levshun, IV Kotenko - Pattern Recognition and Image Analysis, 2023 - Springer
The paper proposes a technique for the application of intelligent methods of correlation of
system events that provides predictive analytics of security states. The proposed technique …

Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation

I Kotenko, D Levshun - 2024 16th International Conference on …, 2024 - ieeexplore.ieee.org
Modern Internet of Things networks combine many devices and sensors that transmit and
process large amounts of data. Security tools identify security events that contain information …