Threat classification model for security information event management focusing on model efficiency

J Kim, HY Kwon - Computers & Security, 2022 - Elsevier
As various types of network threats have increased recently, manual threat response by
security analysts has become a limitation. To compensate for this, the importance of security …

Cyber threat detection based on artificial neural networks using event profiles

J Lee, J Kim, I Kim, K Han - Ieee Access, 2019 - ieeexplore.ieee.org
One of the major challenges in cybersecurity is the provision of an automated and effective
cyber-threats detection technique. In this paper, we present an AI technique for cyber-threats …

[PDF][PDF] Cyber Threat Detection Based On Artificial Neural Networks Using Event Profiles

M Sravanthi, G Suchithra, P Vennela - ijarst.in
One of the major challenges in cybersecurity is the provision of an automated and effective
cyber-threats detection technique. In this paper, we present an AI technique for cyberthreats …

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang… - Cybersecurity, 2022 - Springer
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with
detailed threat attack procedures and indicators of compromise (IOCs), eg, malware hash or …

Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network

Y Gao, X Li, H Peng, B Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber attacks have become increasingly complicated, persistent, organized, and
weaponized. Faces with this situation, drives a rising number of organizations across the …

Automatic event categorizer for SIEM

SMM Hossain, R Couturier, J Rusk… - Proceedings of the 31st …, 2021 - dl.acm.org
Security Information and Event Management (SIEM) is a software solution that is the latest
technological achievement for fighting cybersecurity. SIEM's strength is its ability to …

SmartValidator: A framework for automatic identification and classification of cyber threat data

C Islam, MA Babar, R Croft, H Janicke - Journal of Network and Computer …, 2022 - Elsevier
A wide variety of Cyber Threat Information (CTI) is used by Security Operation Centres
(SOCs) to perform validation of security incidents and alerts. Security experts manually …

[HTML][HTML] Security Information Event Management data acquisition and analysis methods with machine learning principles

N Tendikov, L Rzayeva, B Saoud, I Shayea… - Results in …, 2024 - Elsevier
In the face of increasing global disruptions, the cybersecurity field is confronting rising
threats posed by offensive groups and individual hackers. Traditional security measures …

ScaleNet: scalable and hybrid framework for cyber threat situational awareness based on DNS, URL, and email data analysis

R Vinayakumar, KP Soman… - Journal of Cyber …, 2019 - journals.riverpublishers.com
A computer virus or malware is a computer program, but with the purpose of causing harm to
the system. This year has witnessed the rise of malware and the loss caused by them is …

Deep learning for prioritizing and responding to intrusion detection alerts

S McElwee, J Heaton, J Fraley… - MILCOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Network intrusion detection systems are widely deployed to detect cyberattacks against
computer networks. These systems generate large numbers of security alerts that require …