From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC)

E Jaw, X Wang - PeerJ Computer Science, 2022 - peerj.com
The rapid advanced technological development alongside the Internet with its cutting-edge
applications has positively impacted human society in many aspects. Nevertheless, it …

[HTML][HTML] Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection

M Sheeraz, MH Durad, MA Paracha, SM Mohsin… - Sensors, 2024 - mdpi.com
Advances in connectivity, communication, computation, and algorithms are driving a
revolution that will bring economic and social benefits through smart technologies of the …

Моделирование локационных сигналов, отраженных от кромки земля-море

ВИ Исаков, ДА Шепета - Информационно-управляющие …, 2017 - cyberleninka.ru
Введение: математические модели эхо-сигналов от подстилающих поверхностей
земли и моря необходимы при синтезе и анализе работы бортовых локаторов …

Detecting sophisticated attacks in maritime environments using hybrid situational awareness

S Schauer, EM Kalogeraki… - … on Information and …, 2019 - ieeexplore.ieee.org
In recent years, the growing emergence of digitalization and data explosion has altered the
threat dynamics in the maritime sector. The interconnected Maritime Critical Infrastructures …

An effective high threating alarm mining method for cloud security management

Y Meng, T Qin, Y Liu, C He - IEEE Access, 2018 - ieeexplore.ieee.org
Security equipment such as intrusion prevention system is an important supplementary for
security management. They reduce the difficulty of network management by giving alarms …

Alert correlation using diamond model for cyber threat intelligence

Y Shin, C Lim, M Park, S Cho, I Han… - Proceedings of the …, 2019 - books.google.com
Information security has gathered great attention leading to a variety of network sensors and
Intrusion Detection Systems (IDS), generating numerous threat events. Large number of …

Обзор алгоритмов корреляции событий безопасности для обеспечения безопасности облачных вычислительных сред

ЕС Новикова, ЯА Бекенева, АВ Шоров… - Информационно …, 2017 - cyberleninka.ru
Постановка проблемы: повышение сложности атак на облачные системы влечет за
собой необходимость разработки механизмов защиты, способных анализировать …

Platform (SDK) for Self-Healing of Cloud Services Based on Acquired Cyber Immunity

AA Balyabin - 2023 Seminar on Information Systems Theory …, 2023 - ieeexplore.ieee.org
The paper describes a platform for self-healing of cloud services based on acquired cyber
immunity. This platform is designed to ensure the required level of cyber-resilience of digital …