Intrusion detection and big heterogeneous data: a survey

R Zuech, TM Khoshgoftaar, R Wald - Journal of Big Data, 2015 - Springer
Intrusion Detection has been heavily studied in both industry and academia, but
cybersecurity analysts still desire much more alert accuracy and overall threat analysis in …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

A cyber attack modeling and impact assessment framework

I Kotenko, A Chechulin - 2013 5th International Conference on …, 2013 - ieeexplore.ieee.org
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …

Shielding IoT against cyber‐attacks: an event‐based approach using SIEM

D Diaz Lopez, M Blanco Uribe… - Wireless …, 2018 - Wiley Online Library
Due to the growth of IoT (Internet of Things) devices in different industries and markets in
recent years and considering the currently insufficient protection for these devices, a security …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

A novel machine learning inspired algorithm to predict real-time network intrusions

K Srinivas, N Prasanth, R Trivedi, N Bindra… - International Journal of …, 2022 - Springer
In today's digital world, most organizations are prone to cyberattacks. As a result, they face
huge data and economic loss. Even under some circumstances, the organizations could …

Convolution Neural Network‐Based Higher Accurate Intrusion Identification System for the Network Security and Communication

Z Gu, S Nazir, C Hong, S Khan - Security and Communication …, 2020 - Wiley Online Library
With the development of communication systems, information securities remain one of the
main concerns for the last few years. The smart devices are connected to communicate …

[PDF][PDF] Parallel big data processing system for security monitoring in Internet of Things networks.

IV Kotenko, I Saenko… - J. Wirel. Mob. Networks …, 2017 - researchgate.net
Abstract Nowadays, the Internet of Things (IoT) networks are increasingly used in many
areas. At the same time, the approach connected with the implementation of the network …

Multicriteria decision and machine learning algorithms for component security evaluation: library‐based overview

J Zhang, S Nazir, A Huang… - Security and …, 2020 - Wiley Online Library
Components are the significant part of a system which plays an important role in the
functionality of the system. Components are the reusable part of a system which are already …

Computer attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - 2013 IEEE 7th International …, 2013 - ieeexplore.ieee.org
The paper considers an approach to computer attack modeling and security evaluation
which is suggested to realize in advanced Security Information and Event Management …