A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

[PDF][PDF] Effective security monitoring using efficient SIEM architecture

M Sheeraz, MA Paracha, MU Haque… - Hum.-Centric Comput …, 2023 - researchgate.net
The unprecedented advances and myriad benefits of the internet have made it
indispensable for almost every organization. With its growing popularity and widespread …

[HTML][HTML] Revolutionizing SIEM security: An innovative correlation engine design for multi-layered attack detection

M Sheeraz, MH Durad, MA Paracha, SM Mohsin… - Sensors, 2024 - mdpi.com
Advances in connectivity, communication, computation, and algorithms are driving a
revolution that will bring economic and social benefits through smart technologies of the …

[PDF][PDF] Оценивание защищенности информационных систем на основе графовой модели эксплойтов

ЕВ Федорченко, ИВ Котенко… - Вопросы …, 2023 - cyberrus.info
Одной из важнейших задач мониторинга информа8 ционной безопасности является
автоматизация процес8 са выявления и оценивания слабых мест защищаемой …

Machine Learning Based Approach to Recommend Attack Patterns for Software Requirements Specifications

M Vanamala - 2021 - search.proquest.com
Machine Learning Based Approach to Recommend Attack Patterns for Software
Requirements Specifications Mounika Vanamala North Car Page 1 Machine Learning …

Security assessment based on attack graphs using NVD and MITRE ATT & CK database for heterogeneous infrastructures

R Kryukov, EV Fedorchenko, I Kotenko… - Информационно …, 2024 - i-us.ru
Introduction: Security assessment of modern information systems is a challenging task.
These systems incorporate heterogeneous objects, things, subjects and connections …

Проблематика и особенности процедур аналитической обработки больших массивов гетерогенных данных о событиях кибербезопасности в …

ЛА Виткова, ИБ Паращук, ИБ Саенко - … в науке и образовании …, 2022 - elibrary.ru
Рассмотрены проблематика и ключевые особенности процесса интеллектуальной
аналитической обработки больших массивов гетерогенных данных о событиях …

Semi-structured information in the field of artificial intelligence and information security: processing results

NI Yusupova, ON Smetanina… - IOP Conference …, 2021 - iopscience.iop.org
This article is devoted to the semantic analysis of weakly structured information in the field
of" Artificial intelligence and information security". The methodology of this research included …

[PDF][PDF] D. 2.1. 1 Fighting Cybercrime with OSINT FICO

M Gnaldi, L Grilli, A Milani, A Navarra, MC Pinotti… - fico.dmi.unipg.it
I SOIM possono essere visti come un'applicazione e un'automazione del ciclo di Monitor
Analyze Plan Execute-Knowledge (MAPE-K) per la sicurezza informatica [2], anche se …

СОДЕРЖАНИЕ И ОСОБЕННОСТИ КЛЮЧЕВЫХ СТАДИЙ РАЗРАБОТКИ МЕТОДОВ И МОДЕЛЕЙ ОБРАБОТКИ ДАННЫХ ОБ ИНЦИДЕНТАХ …

ИВ Котенко, ИБ Паращук, ИБ Саенко - … в науке и образовании …, 2023 - elibrary.ru
Рассмотрены содержание и сущность ключевых стадий разработки моделей, методов
и алгоритмов интеллектуальной аналитической обработки больших массивов …