SIEM approach for a higher level of IT security in enterprise networks

KO Detken, T Rix, C Kleiner… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
The threat of cyber-attacks grows up, as one can see by several negative security-news from
companies and private persons.[7] Especially small-and-medium-sized enterprises (SME) …

Open source SIEM solutions for an enterprise

A Tariq, J Manzoor, MA Aziz, ZUA Tariq… - Information & Computer …, 2022 - emerald.com
Purpose The security of applications, systems and networks has always been the source of
great concern for both enterprises and common users. Different security tools like intrusion …

The applicability of a siem solution: Requirements and evaluation

H Mokalled, R Catelli, V Casola… - 2019 IEEE 28th …, 2019 - ieeexplore.ieee.org
The need for SIEM systems increased in the last few years, especially as cyber-attacks are
evolving and targeting enterprises, which may cause discontinuity of their services, leakage …

Specifying IT security awareness

N Hänsch, Z Benenson - 2014 25th International workshop on …, 2014 - ieeexplore.ieee.org
IT users are faced with various threats on a daily basis. Unfortunately, not all possible
dangers are known to them, such that the users fall an easy victim to attacks. For this reason …

Enterprise-oriented cybersecurity management

T Chmielecki, P Cholda, P Pacyna… - 2014 Federated …, 2014 - ieeexplore.ieee.org
Information technology is widely used in processes vital to enterprises. Therefore, IT systems
must meet at least the same level of security as required from the business processes …

Integrated security incident management--concepts and real-world experiences

S Metzger, W Hommel, H Reiser - 2011 Sixth International …, 2011 - ieeexplore.ieee.org
We present a holistic, process-oriented approach to ISO/IEC 27001 compliant security
incident management that integrates multiple state-of-the-art security tools and has been …

[PDF][PDF] Effective security monitoring using efficient SIEM architecture

M Sheeraz, MA Paracha, MU Haque… - Hum.-Centric Comput …, 2023 - researchgate.net
The unprecedented advances and myriad benefits of the internet have made it
indispensable for almost every organization. With its growing popularity and widespread …

A practical implementation of ISMS

A Asosheh, P Hajinazari… - … Conference on e …, 2013 - ieeexplore.ieee.org
Nowadays, access to reliable information has become an essential factor leading to success
in business. In this regard, adequate security of information and systems that process it is …

Taxonomy for unsecure big data processing in security operations centers

N Miloslavskaya, A Tolstoy… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
While the media constantly describes new attacks, the organizations seriously concerned
about their business protection need to be prepared for such sophisticated attacks against …

Common framework for attack modeling and security evaluation in SIEM systems

I Kotenko, A Chechulin - 2012 IEEE International Conference …, 2012 - ieeexplore.ieee.org
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems. It is supposed that the common …