In this paper a methodology for the enhancement of computer networks’ cyber-defense is presented. Using a time-series dataset, drawn for a 60-day period and for 12 hours per day and depicting the occurrences of cyberthreat alerts at hourly intervals, the correlation and dependency coefficients that occur in an organization’s network between different types of cyberthreat alerts are determined. Certain mathematical methods like the Spearman correlation coefficient and the Poisson regression stochastic model are used. For certain types of cyberthreat alerts, results show a significant positive correlation and dependence between them. The analysis methodology presented could help the administrative and IT managers of an organization to impleme...
[[abstract]]The current intrusion detection systems faced the problem of generating too many false a...
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log reso...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
Complementary security systems are widely deployed in networks to protect digital assets. Alert corr...
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection ...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
International audienceCurrent Security Information and Event Management systems (SIEMs) constitute t...
Network intrusion detection sensors are usually built around low level models of network traffic. Th...
In this paper, authors propose a complex of correlation-based methods for security incidents detecti...
International audienceGenerally, the intruder must perform several actions, organized in an intrusio...
[[abstract]]The current intrusion detection systems faced the problem of generating too many false a...
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log reso...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
Complementary security systems are widely deployed in networks to protect digital assets. Alert corr...
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection ...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
International audienceCurrent Security Information and Event Management systems (SIEMs) constitute t...
Network intrusion detection sensors are usually built around low level models of network traffic. Th...
In this paper, authors propose a complex of correlation-based methods for security incidents detecti...
International audienceGenerally, the intruder must perform several actions, organized in an intrusio...
[[abstract]]The current intrusion detection systems faced the problem of generating too many false a...
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log reso...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...