Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

Ontology of metrics for cyber security assessment

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 14th …, 2019 - dl.acm.org
Development of metrics that are valuable for assessing security and decision making is an
important element of efficient counteraction to cyber threats. The paper proposes an …

The ontology of metrics for security evaluation and decision support in SIEM systems

I Kotenko, O Polubelova, I Saenko… - … Reliability and Security, 2013 - ieeexplore.ieee.org
Analysis of computer network security is a serious challenge. Many security metrics has
been proposed for this purpose, but their effective use for rapid and reliable security …

A semantic model for security evaluation of information systems

E Doynikova, A Fedorchenko… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …

Battling against cyberattacks: Towards pre-standardization of countermeasures

P Nespoli, F Gomez Marmol, J Maestre Vidal - Cluster Computing, 2021 - Springer
Cyberattacks targeting ICT systems are becoming every day more sophisticated and
disruptive. Such malevolent actions are performed by ill-motivated entities (governments …

An ontology to promote interoperability between cyber-physical security systems in critical infrastructures

A Canito, K Aleid, I Praça, J Corchado… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
Critical infrastructures, like airports and hospitals, provide essential services and are
considered huge investments in any country. Ensuring the security of these critical …

Approach for determination of cyber-attack goals based on the ontology of security metrics

E Doynikova, I Kotenko - IOP Conference Series: Materials …, 2018 - iopscience.iop.org
The research aims to determinate cyber-attack goals in the information systems of various
types for the further selection of the optimal countermeasures. We propose an approach …

A framework for intelligent DDoS attack detection and response using SIEM and ontology

SD Çakmakçı, H Hutschenreuter… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
In this paper, we propose an intelligent DDoS detection and response framework. It employs
a Security Information and Event Management (SIEM) tool to detect different types of DDoS …

An ontology-based storage of security information

I Kotenko, A Fedorchenko, E Doynikova… - … Technology and Control, 2018 - itc.ktu.lt
The paper suggests an ontology-based approach for design of security data storage. It
analyzes heterogeneous security information for construction of the storage and the statistics …

Towards augmented proactive cyberthreat intelligence

T Khan, M Alam, A Akhunzada, A Hur, M Asif… - Journal of Parallel and …, 2019 - Elsevier
In cyber crimes, attackers are becoming more inventive with their exploits and use more
sophisticated techniques to bypass the deployed security system. These attacks are targeted …