Filters








1,441 Hits in 4.5 sec

Dynamic Threat Weight of Network Security Communication Based on Multisource Data Analysis

Zhihui Yu, Sitong Liu, Weimin Wang, Deepak Kumar Jain
2022 Wireless Communications and Mobile Computing  
Then, the relationship between the data is analyzed by the method of correlation analysis, and the security incident information and threat propagation network are obtained.  ...  The main function of the situation fusion module is to process the multisource data and use the fusion algorithm for data fusion.  ...  , for example, the IDS alarm log often shows the amount of data of G level.  ... 
doi:10.1155/2022/6729827 fatcat:tlwxag6f2fhclbsehldw4xpuau

Author Index Volume 14 (2006)

2006 Journal of Computer Security  
Thomas, Performing real-time threat assessment of security incidents using data fusion of IDS logs (6) 513 -534 Braghin, C., D. Gorla and V.  ...  Gray, Secure pseudonym management using mediated identity-based encryption(3) 249 -267 Cimato, S., A. Cresti and P.  ... 
doi:10.3233/jcs-2006-14606 fatcat:axbmi7c3mvf4hasij4yc3yug4y

Intrusion detection and Big Heterogeneous Data: a Survey

Richard Zuech, Taghi M Khoshgoftaar, Randall Wald
2015 Journal of Big Data  
We discuss the specific issues of Data Fusion, Heterogeneous Intrusion Detection Architectures, and Security Information and Event Management (SIEM) systems, as well as presenting areas where more research  ...  Correlating security events from heterogeneous sources can grant a more holistic view and greater situational awareness of cyber threats.  ...  These Intrusion Detection templates are applied to the online (near real-time) data fusion operations in order to better assess possible threats.  ... 
doi:10.1186/s40537-015-0013-4 fatcat:gkwznr3t5naznhc56nwkikimpm

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE) [chapter]

Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
2019 Pädiatrie  
The proposed solution provides a first of a kind approach for handling cyber security incidents in the digital environments with highly interconnected, complex and diverse nature.  ...  Incident Response professionals) to recognize, identify, dynamically analyse, forecast, treat and respond to their threats and risks and handle their daily cyber incidents.  ...  Acknowledgements The authors would like to thank the University of Piraeus Research Centre for its continuous support.  ... 
doi:10.1007/978-3-030-20257-6_41 dblp:conf/eann/PapastergiouMK19 fatcat:7vfldniab5enfk3rkqcd6qli6q

Present and Future of Network Security Monitoring

Marta Fuentes-Garcia, Jose Camacho, Gabriel Macia-Fernandez
2021 IEEE Access  
Suricata Suricata is both a real-time network IDS and a network IPS. It monitors the network traffic and performs offline processing of pcap files.  ...  Splunk This is a commercial SIEM, which performs network monitoring and real-time data collection, parsing and correlation.  ...  She studied Computer Science and she has a Master Degree in Software Development from the University of Granada. Her PhD was focused in anomaly detection using multivariate data analysis.  ... 
doi:10.1109/access.2021.3067106 fatcat:hv2kviv5vbd67ikmlva6ip6gzu

Characterizing Network Intrusion Prevention System

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
2011 International Journal of Computer Applications  
Keywords Security Threat, Intrusion Prevention System, Mapping Problem IPS Fig 1: Comparison (a) IDS and (b) IPS According to some reported work, proposal [4] describes of fundamental IDS and IPS, currently  ...  An IPS can be defined as an in-line product that focuses on identifying and blocking malicious network activity in real time [4] .  ...  , logging incident record, logging incident notification, logging summary report, and logging failure report [17] .  ... 
doi:10.5120/1811-2439 fatcat:pirx3fj76faibm3anbzmhdkx6e

Performance Improvement of Intrusion Detection Systems

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In order to protect the IoT application, the scenario necessitates the need of IDS that is lightweight in implementation and provides a significantly higher amount of accuracy which is at par with the  ...  The efficiency can be attributed to performance in case of a very high amount of attacks and the accuracy can be attributed to a significantly low amount of false positives.  ...  The logged data for detected events can be utilized for validation alerts and for research of intrusion-related incidents.  ... 
doi:10.35940/ijitee.j9669.0881019 fatcat:rwu2rzbcvbaj3metxj5bqi6ila

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
2021 arXiv   pre-print
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and  ...  ACKNOWLEDGEMENT This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
arXiv:2110.15747v1 fatcat:zboddcg4a5gdxmq5hqmo5cpj34

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
2022 ACM Computing Surveys  
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  ACKNOWLEDGMENTS This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
doi:10.1145/3530809 fatcat:cwk5bp56ere5re2frzgzox56ka

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures

Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
2020 Evolving Systems  
and respond to security threats and risks and and it guides them to handle effectively cyber incidents.  ...  In recent years, the use of information technologies in Critical Infrastructures is gradually increasing. Although this brings benefits, it also increases the possibility of security attacks.  ...  Despite the enormous work done in terms of cyber security, there is still a Fig. 6 Real-time patient monitoring and treatment service need for keeping cyber security tools updated in near real time (  ... 
doi:10.1007/s12530-020-09335-4 fatcat:fx76tetjofdkjapu6ymdrabtdq

Abnormal traffic-indexed state estimation: A cyber–physical fusion approach for Smart Grid attack detection

Ting Liu, Yanan Sun, Yang Liu, Yuhong Gui, Yucheng Zhao, Dai Wang, Chao Shen
2015 Future generations computer systems  
The cyber security incidents, monitored by intrusion detection system (IDS), are quantized to serve as the impact factors that are incorporated into the bad data detection system based on state estimation  ...  including IDS (Snort), bad data detection algorithm (Chi-square test) and SCPSE.  ...  At the same time, the features of published attacks would be extracted as the rules added into the IDS.  ... 
doi:10.1016/j.future.2014.10.002 fatcat:6fmh5flvz5blfbmweuip4322se

Big Data in Intrusion Detection Systems and Intrusion Prevention Systems

Lidong Wang
2017 Journal of Computer Networks  
Big data in intrusion detection systems and Big Data analytics for huge volume of data, heterogeneous features, and real-time stream processing are presented.  ...  Challenges of intrusion detection systems and challenges posed by stream processing of big data in the systems are also discussed.  ...  Real-time distributed stream processing models can benefit traffic monitoring applications for cyber security threats detection.  ... 
doi:10.12691/jcn-4-1-5 fatcat:rtuuaarlunfnjmktivpxzzw4ea

A Mission-Impact-Based Approach to INFOSEC Alarm Correlation [chapter]

Phillip A. Porras, Martin W. Fong, Alfonso Valdes
2002 Lecture Notes in Computer Science  
health and security of their networks.  ...  The intent of this work is to deliver an automated capability to reduce the time and cost of managing multiple INFOSEC devices through a strategy of topology analysis, alert prioritization, and common  ...  Equally important are algorithms for prioritizing which security incidents pose the greatest administrative threats. • The sheer volume of INFOSEC device alerts makes security management a time-consuming  ... 
doi:10.1007/3-540-36084-0_6 fatcat:z3qqo2sidnhstpz4xj64uabeqe

Ontologies for Network Security and Future Challenges [article]

Danny Velasco, Glen Rodriguez
2017 arXiv   pre-print
The research performed here proposes the use of three stages: 1. Inputs; 2. Processing; and 3. Outputs.  ...  Some aspects include identifying threats, intrusion detection systems (IDS), alerts, attacks, countermeasures, security policies, and network management tools.  ...  The safety equipment is distributed in different domains in the network, which is required to develop an ontology that can integrate real-time data from this safety equipment and allows the captured data  ... 
arXiv:1704.02441v1 fatcat:zktpdbqjwjcejbo5hv57qdjcum

Cyber situational awareness – A systematic review of the literature

Ulrik Franke, Joel Brynielsson
2014 Computers & security  
It features prominently in the national cyber strategies of many countries, and there is a considerable body of research dealing with it.  ...  However, until now, there has been no systematic and up-to-date review of the scientific literature on cyber situational awareness.  ...  Acknowledgments This work has been supported by Security Link, in the Strategic Area for security and crisis management research, funded by the Swedish Government.  ... 
doi:10.1016/j.cose.2014.06.008 fatcat:buxp4gus7vfg3gp2nwljepzfry
« Previous Showing results 1 — 15 out of 1,441 results