최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International Journal of Information Security : IJIS, v.22 no.3, 2023년, pp.691 - 711
López Velásquez, Juan Miguel , Martínez Monterrubio, Sergio Mauricio , Sánchez Crespo, Luis Enrique , Garcia Rosado, David
초록이 없습니다.
G Gonzalez Granadillo 148 2012 Global Security, Safety and Sustainability & e-Democracy 10.1007/978-3-642-33448-1_21 Gonzalez Granadillo, G., Ben Mustapha, Y., Hachem, N., Debar, H.: An ontology-based model for SIEM environments. In: Global Security, Safety and Sustainability & e-Democracy, pp. 148-155. Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-33448-1_21
Comput. Secur. F Menges 103 102165 2021 10.1016/j.cose.2020.102165 Menges, F., Latzo, T., Vielberth, M., Sobola, S., Pöhls, H.C., Taubmann, B., Köstler, J., Puchta, A., Freiling, F., Reiser, H.P., Pernul, G.: Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103, 102165 (2021). https://doi.org/10.1016/j.cose.2020.102165
Comput. Secur. BD Bryant 94 101817 2020 10.1016/j.cose.2020.101817 Bryant, B.D., Saiedian, H.: Improving SIEM alert metadata aggregation with a novel kill-chain based classification model. Comput. Secur. 94, 101817 (2020). https://doi.org/10.1016/j.cose.2020.101817
Comput. Secur. BD Bryant 67 198 2017 10.1016/j.cose.2017.03.003 Bryant, B.D., Saiedian, H.: A novel kill-chain framework for remote security log analysis with SIEM software. Comput. Secur. 67, 198 (2017). https://doi.org/10.1016/j.cose.2017.03.003
Inf. Softw. Technol. B Kitchenham 55 12 2049 2013 10.1016/j.infsof.2013.07.010 Kitchenham, B., Brereton, P.: A systematic review of systematic review process research in software engineering. Inf. Softw. Technol. 55(12), 2049 (2013). https://doi.org/10.1016/j.infsof.2013.07.010
10.1016/B978-0-12-411474-6.00025-6 Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., In’acio, P.R.: A quick perspective on the current state in cybersecurity. Emerg Trends ICT Secur. 423-442 (2014). https://doi.org/10.1016/B978-0-12-411474-6.00025-6. https://linkinghub.elsevier.com/retrieve/pii/B9780124114746000256
10.1016/B978-0-12-811373-8.00011-2 Casola, V., De Benedictis, A., Rak, M., Villano, U.: In: Ficco, M., Palmieri, F. (eds.) Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, Intelligent Data-Centric Systems, pp. 235-259. Academic Press (2018). https://doi.org/10.1016/B978-0-12-811373-8.00011-2
IEEE Access J Lee 7 165607 2019 10.1109/ACCESS.2019.2953095 Lee, J., Kim, J., Kim, I., Han, K.: Cyber threat detection based on artificial neural networks using event profiles. IEEE Access 7, 165607 (2019). https://doi.org/10.1109/ACCESS.2019.2953095
Synth. Lect. Data Manag. E Bertino 4 4 1 2012 10.2200/S00431ED1V01Y201207DTM028 Bertino, E.: Data protection from insider threats. Synth. Lect. Data Manag. 4(4), 1 (2012). https://doi.org/10.2200/S00431ED1V01Y201207DTM028
10.1007/978-3-319-95189-8_2 Staffa, M., Coppolino, L., Sgaglione, L., Gelenbe, E., Komnios, I., Grivas, E., Stan, O., Castaldo, L.: KONFIDO: an OpenNCP-based secure eHealth data exchange system. In: Communications in Computer and Information Science, vol. 821, pp. 11-27. Springer (2018). https://doi.org/10.1007/978-3-319-95189-8_2
10.1007/978-3-642-55032-4_47 Kotenko, I., Doynikova, E.: Security assessment of computer networks based on attack graphs and security events, In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) Information and Communication Technology, vol. 8407, pp. 462-471. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-55032-4_47
10.1007/978-981-15-8377-3 Tiwari, S., Suryani, E., Ng, A.K., Mishra, K.K., Singh, N.: In: Tiwari, S., Suryani, E., Ng, A.K., Mishra, K.K., Singh N. (eds.) Proceedings of International Conference on Big Data, Machine Learning and their Applications, Lecture Notes in Networks and Systems, vol. 150, Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-8377-3
Sensors JV Botello 20 16 4636 2020 10.3390/s20164636 Botello, J.V., Mesa, A.P., Rodríguez, F.A., Díaz-López, D., Nespoli, P., Mármol, F.G.: BlockSIEM: protecting smart city services through a Blockchain-based and distributed SIEM. Sensors 20(16), 4636 (2020). https://doi.org/10.3390/s20164636
IEEE Access ME Aminanto 8 217977 2020 10.1109/ACCESS.2020.3041837 Aminanto, M.E., Ban, T., Isawa, R., Takahashi, T., Inoue, D.: Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis. IEEE Access 8, 217977 (2020). https://doi.org/10.1109/ACCESS.2020.3041837
Inf. Syst. F Alves 95 101586 2021 10.1016/j.is.2020.101586 Alves, F., Bettini, A., Ferreira, P.M., Bessani, A.: Processing tweets for cybersecurity threat awareness. Inf. Syst. 95, 101586 (2021). https://doi.org/10.1016/j.is.2020.101586
IEEE Secur. Priv. Mag. I Aguirre 10 1 55 2012 10.1109/MSP.2011.153 Aguirre, I., Alonso, S.: Improving the automation of security information management: a collaborative approach. IEEE Secur. Priv. Mag. 10(1), 55 (2012). https://doi.org/10.1109/MSP.2011.153
Future Gener. Comput. Syst. JPA Yaacoub 105 581 2020 10.1016/j.future.2019.12.028 Yaacoub, J.P.A., Noura, M., Noura, H.N., Salman, O., Yaacoub, E., Couturier, R., Chehab, A.: Securing internet of medical things systems: limitations, issues and recommendations. Future Gener. Comput. Syst. 105, 581 (2020). https://doi.org/10.1016/j.future.2019.12.028
Future Gener. Comput. Syst. M Repetto 115 251 2021 10.1016/j.future.2020.08.044 Repetto, M., Carrega, A., Rapuzzi, R.: An architecture to manage security operations for digital service chains. Future Gener. Comput. Syst. 115, 251 (2021). https://doi.org/10.1016/j.future.2020.08.044
Netw. Secur. M Campfield 2020 9 6 2020 10.1016/S1353-4858(20)30104-5 Campfield, M.: The problem with (most) network detection and response. Netw. Secur. 2020(9), 6 (2020). https://doi.org/10.1016/S1353-4858(20)30104-5
10.1109/PDP2018.2018.00080 Kotenko, I., Fedorchenko, A., Saenko, I., Kushnerevich, A.: Parallelization of security event correlation based on accounting of event type links. In: 2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), pp. 462-469 (2018). https://doi.org/10.1109/PDP2018.2018.00080
Netw. Secur. R Meyers 2020 10 17 2020 10.1016/S1353-4858(20)30119-7 Meyers, R.: Data highway and the digital transformation: arguments for secure, centralised log management. Netw. Secur. 2020(10), 17 (2020). https://doi.org/10.1016/S1353-4858(20)30119-7
Comput. Secur. L Giddens 99 102066 2020 10.1016/j.cose.2020.102066 Giddens, L., Amo, L.C., Cichocki, D.: Gender bias and the impact on managerial evaluation of insider security threats. Comput. Secur. 99, 102066 (2020). https://doi.org/10.1016/j.cose.2020.102066
10.1007/978-981-13-6621-5_10 Li, Y., Zhang, T., Li, X., Li, T.: A model of apt attack defense based on cyber threat detection. In: Yun, X., Wen, W., Lang, B., Yan, H., Ding, L., Li, J., Zhou, Y. (eds.) Cyber Security, vol. 970, pp. 122-135. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-6621-5_10
IEEE Secur. Priv. S Bhatt 12 5 35 2014 10.1109/MSP.2014.103 Bhatt, S., Manadhata, P.K., Zomlot, L.: The Operational role of security information and event management systems. IEEE Secur. Priv. 12(5), 35 (2014). https://doi.org/10.1109/MSP.2014.103
IEEE Secur. Priv. AA Cárdenas 11 6 74 2013 10.1109/MSP.2013.138 Cárdenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics for security. IEEE Secur. Priv. 11(6), 74 (2013). https://doi.org/10.1109/MSP.2013.138
IEEE Secur. Priv. J Margulies 13 3 84 2015 10.1109/MSP.2015.50 Margulies, J.: A developer’s guide to audit logging. IEEE Secur. Priv. 13(3), 84 (2015). https://doi.org/10.1109/MSP.2015.50
SN Comput. Sci. L Coppolino 3 1 16 2021 10.1007/s42979-021-00858-4 Coppolino, L., Sgaglione, L., D’Antonio, S., Magliulo, M., Romano, L., Pacelli, R.: Risk assessment driven use of advanced SIEM technology for cyber protection of critical e-health processes. SN Comput. Sci. 3(1), 16 (2021). https://doi.org/10.1007/s42979-021-00858-4
Procedia Comput. Sci. MSN Raja 115 580 2017 10.1016/j.procs.2017.09.117 Raja, M.S.N., Vasudevan, A.: Rule generation for TCP SYN flood attack in SIEM environment. Procedia Comput. Sci. 115, 580 (2017). https://doi.org/10.1016/j.procs.2017.09.117
10.1109/InCIT50588.2020.9310950 Mulyadi, F., Annam, L.A., Promya, R., Charnsripinyo, C.: Implementing Dockerized Elastic Stack for Security Information and Event Management. In: 2020-5th International Conference on Information Technology (InCIT), pp. 243-248 (2020). https://doi.org/10.1109/InCIT50588.2020.9310950
10.1109/ARES.2013.82 Vianello, V., Gulisano, V., Jimenez-Peris, R., Patino-Martinez, M., Torres, R., Diaz, R., Prieto, E.: A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure. In: 2013 International Conference on Availability, Reliability and Security, pp. 625-629 (2013). https://doi.org/10.1109/ARES.2013.82
10.1007/978-3-642-24270-0_15 Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: a dam case study, In: Flammini, F., Bologna, S., Vittorini, V. (ed.) Computer Safety, Reliability, and Security. SAFECOMP 2011, pp. 199-212. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-24270-0_15
10.1007/978-3-030-12786-2_1 Hindy, H., Brosset, D., Bayne, E., Seeam, A., Bellekens, X.: Improving SIEM for critical SCADA water infrastructures using machine learning. In: Lecture Notes in Computer Science, vol. 11387, pp. 3-19. Springer, Switzerland (2019). https://doi.org/10.1007/978-3-030-12786-2_1
10.1007/978-3-662-45355-1_14 Formicola, V., Di Pietro, A., Alsubaie, A., D’Antonio, S., Marti, J.: Assessing the impact of cyber attacks on wireless sensor nodes that monitor interdependent physical systems. In: International Conference on Critical Infrastructure Protection, vol. 441, pp. 213-229. Springer (2014). https://doi.org/10.1007/978-3-662-45355-1_14
J. Inf. Secur. Appl. M Di Mauro 38 85 2018 10.1016/j.jisa.2017.12.001 Di Mauro, M., Di Sarno, C.: Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection. J. Inf. Secur. Appl. 38, 85 (2018). https://doi.org/10.1016/j.jisa.2017.12.001
10.1109/TELFOR.2015.7377381 Chernov, A.V., Butakova, M.A., Karpenko, E.V.: Security incident detection technique for multilevel intelligent control systems on railway transport in Russia. In: 2015 23rd Telecommunications Forum Telfor (TELFOR), pp. 1-4 (2015). https://doi.org/10.1109/TELFOR.2015.7377381
Autom. Control Comput. Sci. DS Lavrova 50 8 673 2016 10.3103/S0146411616080125 Lavrova, D.S.: An approach to developing the SIEM system for the Internet of Things. Autom. Control Comput. Sci. 50(8), 673 (2016). https://doi.org/10.3103/S0146411616080125
Inf. Commun. Technol. Intell. Syst. S Muthuraj 196 533 2021 10.1007/978-981-15-7062-9_53 Muthuraj, S., Sethumadhavan, M., Amritha, P.P., Santhya, R.: Detection and prevention of attacks on active directory using SIEM. Inf. Commun. Technol. Intell. Syst. 196, 533 (2021). https://doi.org/10.1007/978-981-15-7062-9_53
10.1145/3460620.3460747 Hwoij, A., Khamaiseh, A., Ababneh, M.: SIEM architecture for the Internet of Things and smart city. In: International Conference on Data Science, E-Learning and Information Systems 2021. Association for Computing Machinery, New York, DATA’21, pp. 147-152 (2021). https://doi.org/10.1145/3460620.3460747
10.1007/978-81-322-2012-1_24 Anumol, E.T.: Use of machine learning algorithms with SIEM for attack prediction. In: Jain, L.C., Patnaik, S., Ichalkaranje, N. (eds.), Intelligent Computing, Communication and Devices, pp. 231-235. Springer, New Delhi (2015). https://doi.org/10.1007/978-81-322-2012-1_24
10.1109/BigDataSecurity-HPSC-IDS.2016.41 Zhong, C., Yen, J., Liu, P., Erbacher, R.F.: Automate cybersecurity data triage by leveraging human analysts’ cognitive process. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 357-363 (2016). https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.41
Future Gener. Comput. Syst. N Usman 118 124 2021 10.1016/j.future.2021.01.004 Usman, N., Usman, S., Khan, F., Jan, M.A., Sajid, A., Alazab, M., Watters, P.: Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics. Future Gener. Comput. Syst. 118, 124 (2021). https://doi.org/10.1016/j.future.2021.01.004
10.1109/SYSCO.2016.7831327 Bachane, I., Adsi, Y.I.K., Adsi, H.C.: Real time monitoring of security events for forensic purposes in Cloud environments using SIEM. In: 2016 Third International Conference on Systems of Collaboration (SysCo) (IEEE, 2016), pp. 1-3. https://doi.org/10.1109/SYSCO.2016.7831327. http://ieeexplore.ieee.org/document/7831327/
I Kotenko 219 2014 Dynamical Attack Simulation for Security Information and Event Management 10.1007/978-3-642-31833-7_14 Kotenko, I., Shorov, A., Chechulin, A., Novikova, E.: Dynamical Attack Simulation for Security Information and Event Management, pp. 219-234. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-31833-7_14
Int. Trans. Syst. Sci. Appl. I Kotenko 8 129 2012 Kotenko, I., Chechulin, A.: Attack modeling and security evaluation in SIEM systems. Int. Trans. Syst. Sci. Appl. 8, 129 (2012)
Networking T Peng 3042 771 2004 10.1007/978-3-540-24693-0_63 Peng, T., Leckie, C., Ramamohanarao, K.: Proactively detecting distributed denial of service attacks using source IP address monitoring. Networking 3042, 771 (2004). https://doi.org/10.1007/978-3-540-24693-0_63
10.1109/ARES.2013.85 Di Sarno, C., Formicola, V., Sicuranza, M., Paragliola, G.: Addressing security issues of electronic health record systems through enhanced SIEM technology. In: 2013 International Conference on Availability, Reliability and Security, pp. 646-653 (2013). https://doi.org/10.1109/ARES.2013.85
Netw. Secur. J Inns 2014 5 16 2014 10.1016/S1353-4858(14)70051-0 Inns, J.: The evolution and application of SIEM systems. Netw. Secur. 2014(5), 16 (2014). https://doi.org/10.1016/S1353-4858(14)70051-0
Comput. Fraud Secur. D Howell 2015 8 19 2015 10.1016/S1361-3723(15)30077-4 Howell, D.: Building better data protection with SIEM. Comput. Fraud Secur. 2015(8), 19 (2015). https://doi.org/10.1016/S1361-3723(15)30077-4
Netw. Secur. S Udipi 2021 1 12 2021 10.1016/S1353-4858(21)00008-8 Udipi, S.: The event data management problem: getting the most from network detection and response. Netw. Secur. 2021(1), 12 (2021). https://doi.org/10.1016/S1353-4858(21)00008-8
10.1109/WETICE.2019.00036 Mokalled, H., Catelli, R., Casola, V., Debertol, D., Meda, E., Zunino, R.: The applicability of a SIEM solution: requirements and evaluation. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 132-137 (2019). https://doi.org/10.1109/WETICE.2019.00036
Ind. Manag. Data Syst. B Sahay 103 2 97 2003 10.1108/02635570310463429 Sahay, B., Gupta, A.: Development of software selection criteria for supply chain solutions. Ind. Manag. Data Syst. 103(2), 97 (2003). https://doi.org/10.1108/02635570310463429
10.1109/UBMK52708.2021.9558964 Ünal, U., Kahya, C.N., Kurtlutepe, Y., Dağ, H.: Investigation of cyber situation awareness via SIEM tools: a constructive review. In: 2021 6th International Conference on Computer Science and Engineering (UBMK), pp. 676-681 (2021). https://doi.org/10.1109/UBMK52708.2021.9558964
10.1007/978-3-030-67101-3_21 Svoboda, T., Horalek, J., Sobeslav, V.: Behavioral analysis of SIEM solutions for energy technology systems. In: Context-Aware Systems and Applications, and Nature of Computation and Communication. Springer, pp. 265-276 (2021). https://doi.org/10.1007/978-3-030-67101-3_21
Gartner, I.N.C.: IT Glossary. https://www.gartner.com/en/information-technology/glossary. Accessed 05 Sept 2022
Kończak, J., de Sousa Santos, N.F., Żurkowski, T., Wojciechowski, P.T., Schiper, A.: JPaxos: state machine replication based on the Paxos protocol (2011)
10.1007/978-3-642-41485-5_2 Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) Critical Information Infrastructures Security, pp. 10-21. Springer, Berlin (2013). https://doi.org/10.1007/978-3-642-41485-5_2
I.B.M. Corp. QRadar on Cloud (2022). https://www.ibm.com/products/hosted-security-intelligence. Accessed 05 Sept 2022
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.