A systematic mapping study on intrusion alert analysis in intrusion detection systems

AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …

Технологии больших данных для корреляции событий безопасности на основе учета типов связей

ИВ Котенко, АВ Федорченко, ИБ Саенко… - Вопросы …, 2017 - cyberleninka.ru
Работа посвящена исследованию подхода к параллельной обработке данных для
выполнения задач корреляции событий безопасности на основе технологий больших …

Discovering and utilising expert knowledge from security event logs

S Khan, S Parkinson - Journal of Information Security and Applications, 2019 - Elsevier
Vulnerability assessment and security configuration of computer systems is heavily
dependent on human experts, which are widely attributed as being in short supply. This can …

Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks

I Kotenko, A Fedorchenko, E Doynikova - Advances in cyber security …, 2020 - Springer
This chapter considers the methods and techniques for security management of complex
heterogeneous systems with an emphasis on event correlation and security assessment …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

Parallelization of security event correlation based on accounting of event type links

I Kotenko, A Fedorchenko, I Saenko… - 2018 26th Euromicro …, 2018 - ieeexplore.ieee.org
The paper proposes a novel approach to parallel data processing for solving security event
correlation problems based on Big Data technologies. Different security event correlation …

AI-and metrics-based vulnerability-centric cyber security assessment and countermeasure selection

I Kotenko, E Doynikova, A Chechulin… - Guide to Vulnerability …, 2018 - Springer
This chapter considers methods and techniques for analytical processing of cyber security
events and information. The approach suggested in the chapter is based on calculating a set …

Автоматизированное определение активов и оценка их критичности для анализа защищенности информационных систем

ЕВ Дойникова, АВ Федорченко… - Информатика и …, 2019 - ia.spcras.ru
Аннотация Цель исследования заключается в разработке методики
автоматизированного выделения активов информационной системы и сравнительной …

Reducing the number of incidents in converged IT infrastructure using correlation approach

G Kostadinov, T Atanasova… - … and Informatics (ICAI), 2020 - ieeexplore.ieee.org
The operational staff in IT is obliged to comply with the requirements for digital business
transformation, which should change the traditional IT management techniques. In the spirit …

IOT Security event correlation based on the analysis of event types

A Fedorchenko, I Kotenko - Dependable IoT for Human and …, 2022 - api.taylorfrancis.com
The current level of information technology development requires increased attention to
cyber security. More and more spheres of human activity are influenced by information …