Data intensive computing research and technology developments offer the potential of providing significant improvements in several security log management challenges. Approaches to address the complexity, timeliness, expense, diversity, and noise issues have been identified. These improvements are motivated by the increasingly important role of analytics. Machine learning and expert systems that incorporate attack patterns are providing greater detection insights. Finding actionable indicators requires the analysis to combine security event log data with other network data such and access control lists, making the big-data problem even bigger. Automation of threat intelligence is recognized as not complete with limited adoption of standards...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
Keeping networks secure has never been such an imperative task as today. Threats come from hardware ...
Security threats and economic loss caused by network attacks, intrusions and vulnerabilities have mo...
Abstract This paper describes data mining and data warehousing techniques that can improve the perfo...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
The focus of this thesis is on data collection and in particular data collection for intrusion detec...
A computer system generates logs to record all relevant operational data about the system and all op...
Digital crimes are increasing exponentially and people with possession of even a simple digital devi...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Cyber infrastructure that supports advanced research computing faces many challenges in defending ag...
Forensic analysis of logs is one responsibility of an enterprise cyber defense team; inherently, thi...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
Log analysis is an efficiency way to detect threats by scrutinizing the events recorded by the opera...
In today's computer network environments huge amounts of security log data are produced. To handle t...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
Keeping networks secure has never been such an imperative task as today. Threats come from hardware ...
Security threats and economic loss caused by network attacks, intrusions and vulnerabilities have mo...
Abstract This paper describes data mining and data warehousing techniques that can improve the perfo...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
The focus of this thesis is on data collection and in particular data collection for intrusion detec...
A computer system generates logs to record all relevant operational data about the system and all op...
Digital crimes are increasing exponentially and people with possession of even a simple digital devi...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Cyber infrastructure that supports advanced research computing faces many challenges in defending ag...
Forensic analysis of logs is one responsibility of an enterprise cyber defense team; inherently, thi...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
Log analysis is an efficiency way to detect threats by scrutinizing the events recorded by the opera...
In today's computer network environments huge amounts of security log data are produced. To handle t...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
Keeping networks secure has never been such an imperative task as today. Threats come from hardware ...
Security threats and economic loss caused by network attacks, intrusions and vulnerabilities have mo...