A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning

AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …

Cyber threats classifications and countermeasures in banking and financial sector

AA Darem, AA Alhashmi, TM Alkhaldi… - IEEE …, 2023 - ieeexplore.ieee.org
The banking and financial sector has always been a prime target for cyber threats due to the
critical nature of the information they handle. With the increasing dependence on technology …

Breaking alert fatigue: Ai-assisted siem framework for effective incident response

T Ban, T Takahashi, S Ndichu, D Inoue - Applied Sciences, 2023 - mdpi.com
Contemporary security information and event management (SIEM) solutions struggle to
identify critical security incidents effectively due to the overwhelming number of false alerts …

Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4

M Kaheh, DK Kholgh, P Kostakos - arXiv preprint arXiv:2309.16422, 2023 - arxiv.org
In an era where cyberspace is both a battleground and a backbone of modern society, the
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …

Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

[HTML][HTML] A forensics and compliance auditing framework for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - International Journal of Critical …, 2023 - Elsevier
Contemporary societies are increasingly dependent on products and services provided by
Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation …

Data confidentiality and integrity: a review of accounting and cybersecurity controls in superannuation organizations

A Anyanwu, T Olorunsogo, TO Abrahams… - Computer Science & IT …, 2024 - fepbl.com
In an era dominated by digital transformation, superannuation organizations face
unprecedented challenges in safeguarding the confidentiality and integrity of sensitive …

[PDF][PDF] Effective security monitoring using efficient SIEM architecture

M Sheeraz, MA Paracha, MU Haque… - Hum.-Centric Comput …, 2023 - researchgate.net
The unprecedented advances and myriad benefits of the internet have made it
indispensable for almost every organization. With its growing popularity and widespread …