An analysis of information security event managers

K Thakur, S Kopecky, M Nuseir… - 2016 IEEE 3rd …, 2016 - ieeexplore.ieee.org
The most effective security starts with real time visibility into all activity on all systems,
networks, database and applications. In this paper the focus in on structured data however …

A high-level domain-specific language for SIEM (design, development and formal verification)

A Nazir, M Alam, SUR Malik, A Akhunzada… - Cluster …, 2017 - Springer
Organizations deploy security information and event management (SIEM) systems for
centralized management of security events. The real-time security monitoring capability of …

A hybrid machine learning method for intrusion detection

C Meinel, M Ghasemzadeh, HR Hemati - International Journal of Engineering, 2016 - ije.ir
Data security is an important area of concern for every computer system owner. An intrusion
detection system is a device or software application that monitors a network or systems for …

Association analysis of cyber-attack attribution based on threat intelligence

Q Li, Z Yang, Z Jiang, B Liu, Y Fu - 2017 2nd Joint International …, 2017 - atlantis-press.com
This paper presented an association analysis method in cyber-attack attribution based on
threat intelligence. The method used the local advantage model to analyse the data related …

An approach for scale suspicious network events detection

C Dong, YF Chen, YJ Zhang, B Jiang… - … Conference on Big …, 2019 - ieeexplore.ieee.org
Detecting the real suspicious events from a large number of low-quality alerts is a severe
challenge to the security operations center teams. In this paper, we present an approach to …

[PDF][PDF] Distributed log analysis for scenario-based detection of multi-step attacks and generation of near-optimal defense recommendations

K Kaynar - 2017 - depositonce.tu-berlin.de
Detecting related, ongoing actions of attackers is significant for providing a complete
situational assessment of security and determining the most effective reactive defense …

[PDF][PDF] Enabling Big Data security analytics for advanced network attack detection

D Jaeger - 2018 - researchgate.net
The last years have shown an increasing sophistication of attacks against enterprises.
Traditional security solutions like firewalls, anti-virus systems and generally Intrusion …

[引用][C] An Analysis of Information Security Event Managers and the Data Extracted for Detecting Hidden Threats

K Thakur, S Kopecky, M Nuseir, A Copeland, N Saxena…