Critical computer systems strongly rely on event logs to record the occurrence of normative and anomalous events occurring at runtime. In spite of the advances in Security Information and Event Management for handling monitoring data in production, event logs remain quite underutilized with respect to more conventional security data sources. Eliciting actionable knowledge for situational awareness poses many challenges in the case of logs emitted by industrial systems due to the lack of standard practices, formats and threat models. This paper addresses log analysis in a critical industrial system. We conduct our study with a real-life system by a top leading company in the Air Traffic Control domain, which emits massive volumes of unstr...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring ind...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Recent advances in contextual anomaly detection attempt to combine resource metrics and event logs t...
Log files are rich sources of information exhibiting the actions performed during the usage of a com...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring ind...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Recent advances in contextual anomaly detection attempt to combine resource metrics and event logs t...
Log files are rich sources of information exhibiting the actions performed during the usage of a com...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
Critical information systems strongly rely on event logging techniques to collect data, such as hous...
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring ind...