Fast network attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - Journal of Cyber Security and …, 2014 - journals.riverpublishers.com
The paper suggests an approach to network attack modeling and security evaluation which
is realized in advanced Security Information and Event Management (SIEM) systems. It is …

Parallelization of security event correlation based on accounting of event type links

I Kotenko, A Fedorchenko, I Saenko… - 2018 26th Euromicro …, 2018 - ieeexplore.ieee.org
The paper proposes a novel approach to parallel data processing for solving security event
correlation problems based on Big Data technologies. Different security event correlation …

Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams

M Kolomeets, A Chechulin, I Kotenko - … in Information Systems: IFIP WG 8.4 …, 2016 - Springer
In this paper we propose an approach to the development of the computer network
visualization system for security monitoring, which uses a conceptually new model of …

Assessment of components to ensure the security of control and diagnostic information about technological processes

I Kotenko, I Parashchuk - MATEC Web of Conferences, 2020 - matec-conferences.org
The features of the technique are considered to ensure the security of control and diagnostic
information about technological processes is carried out. As an example, a theoretical and …

A decision support model for situational awareness in national cyber operations centers

R Graf, F Skopik, K Whitebloom - … International Conference On …, 2016 - ieeexplore.ieee.org
Advances in situational awareness technology have led to the creation of increasingly
sophisticated tools across different application domains, often involving non-textual, highly …

Identification of attack on data packets using rough set approach to secure end to end communication

B Wu, S Nazir, N Mukhtar - Complexity, 2020 - Wiley Online Library
Security has become one of the important factors for any network communication and
transmission of data packets. An organization with an optimal security system can lead to a …

Показатели и методики оценки защищенности компьютерных сетей на основе графов атак и графов зависимостей сервисов

ЕВ Дойникова - Информатика и автоматизация, 2013 - proceedings.spiiras.nw.ru
Аннотация В данной работе рассматриваются основные направления исследований в
области показателей защищенности и вводится сформированная на их основе …

Design of integrated vulnerabilities database for computer networks security analysis

A Fedorchenko, I Kotenko… - 2015 23rd Euromicro …, 2015 - ieeexplore.ieee.org
Integration of existing open vulnerabilities databases allows to increase the probability of
detection of vulnerable software and hardware that are used in computer networks and …

Formation of Indicators for Assessing Technical Reliability of Information Security Systems

IV Kotenko, IB Parashchuk - 2018 International Russian …, 2018 - ieeexplore.ieee.org
A method is presented that allows forming the indicators of the technical reliability of
information security systems. This method is based on the algorithms of extrapolating neural …

A high-level domain-specific language for SIEM (design, development and formal verification)

A Nazir, M Alam, SUR Malik, A Akhunzada… - Cluster …, 2017 - Springer
Organizations deploy security information and event management (SIEM) systems for
centralized management of security events. The real-time security monitoring capability of …