In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers), a tool and methodology enabling security researchers and operators to evaluate the performance of deployed and operational Security Operation Centers (SOC) — or any other security monitoring infrastructure. The methodology relies on the MITRE ATT&CK Framework to define a procedure to generate and automatically inject synthetic attacks in an operational SOC to evaluate any output metric of interest (e.g., detection accuracy, time-to-investigation). To evaluate the effectiveness of the proposed methodology, we devise an experiment with n=124 students playing the role of SOC analysts. The experiment reli...
In this project we want to expose what is a Security Operations Center (SOC) and why companies need...
In most contexts, it is not feasible to guarantee that a system is 100 % secure. Measures and predic...
Security breaches caused by hackers are a significant issue for businesses. This illustrates the nee...
In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Pe...
In this 21st century, we have seen a major rise in the use of advanced technological devices. It is ...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The increasing use of Security Operations Centers (SOCs) by organisations as a part of their cyberse...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
The first part of this thesis describes the results of applying dependability methods to the securit...
Security researchers have been trying to understand func-tioning of a security operation center (SOC...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions....
To keep up with the challenges of modern threat environment, organizations have had to rethink their...
Cyber Security Operations Centres (SOCs) are attracting much attention in recent times as they play ...
In this project we want to expose what is a Security Operations Center (SOC) and why companies need...
In most contexts, it is not feasible to guarantee that a system is 100 % secure. Measures and predic...
Security breaches caused by hackers are a significant issue for businesses. This illustrates the nee...
In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Pe...
In this 21st century, we have seen a major rise in the use of advanced technological devices. It is ...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
The increasing use of Security Operations Centers (SOCs) by organisations as a part of their cyberse...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
The first part of this thesis describes the results of applying dependability methods to the securit...
Security researchers have been trying to understand func-tioning of a security operation center (SOC...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions....
To keep up with the challenges of modern threat environment, organizations have had to rethink their...
Cyber Security Operations Centres (SOCs) are attracting much attention in recent times as they play ...
In this project we want to expose what is a Security Operations Center (SOC) and why companies need...
In most contexts, it is not feasible to guarantee that a system is 100 % secure. Measures and predic...
Security breaches caused by hackers are a significant issue for businesses. This illustrates the nee...