Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

Improving SIEM alert metadata aggregation with a novel kill-chain based classification model

BD Bryant, H Saiedian - Computers & Security, 2020 - Elsevier
Today's information networks face increasingly sophisticated and persistent threats, where
new threat tools and vulnerability exploits often outpace advancements in intrusion detection …

Построение доверенной вычислительной среды

АВ Красов, АМ Гельфанд, ВИ Коржик, ИВ Котенко… - 2019 - elibrary.ru
В монографии рассматриваются актуальные вопросы построения доверенной
вычислительной среды. Представлено несколько важнейших аспектов построения …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

SIEM approach for a higher level of IT security in enterprise networks

KO Detken, T Rix, C Kleiner… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
The threat of cyber-attacks grows up, as one can see by several negative security-news from
companies and private persons.[7] Especially small-and-medium-sized enterprises (SME) …

Computer attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - 2013 IEEE 7th International …, 2013 - ieeexplore.ieee.org
The paper considers an approach to computer attack modeling and security evaluation
which is suggested to realize in advanced Security Information and Event Management …

Anomaly detection in the HVAC system operation by a RadViz based visualization-driven approach

E Novikova, M Bestuzhev, I Kotenko - … 27, 2019 Revised Selected Papers 5, 2020 - Springer
The appearance of the smart houses, buildings, and cities has defined new attack scenarios
targeting industrial information systems. The paper suggests a visualization-driven approach …

Visualization of security metrics for cyber situation awareness

I Kotenko, E Novikova - 2014 Ninth International Conference on …, 2014 - ieeexplore.ieee.org
One of the important direction of research in situational awareness is implementation of
visual analytics techniques which can be efficiently applied when working with big security …

SIEM implementation for global and distributed environments

I Anastasov, D Davcev - 2014 World Congress on Computer …, 2014 - ieeexplore.ieee.org
Today's computer networks produce a huge amount of security log data. Handling this data
is impossible without using Security Information and Event Management Systems (SIEM) to …