Results 1 to 10 of about 98,773 (321)

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]

open access: yesPLoS ONE
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor   +3 more
doaj   +3 more sources

You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks [PDF]

open access: yesarXiv, 2023
Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them from reaching their final goals.
Hackländer, Louis   +4 more
arxiv   +4 more sources

Simple, Fast, and Accurate Cybercrime Detection on E-Government with Elastic Stack SIEM [PDF]

open access: goldJurnal Edukasi dan Penelitian Informatika (JEPIN), 2023
Increased public activity in cyberspace (Internet) during the Covid-19 pandemic has also increased cybercrime cases with various attack targets, including E-Government services. Cybercrime is hidden and occurs unnoticed in E-Government, so handling it is
Ichsan Yudhianto
core   +4 more sources

Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]

open access: greenarXiv, 2014
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge. However, they currently present several limitations that have to be overcome.
Alessia Garofalo   +4 more
arxiv   +6 more sources

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures

open access: yesSensors, 2021
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo   +2 more
doaj   +2 more sources

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +2 more sources

Study of the applicability of the hierarchy analysis method for choosing a SIEM system

open access: diamondБезопасность информационных технологий, 2023
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya   +2 more
doaj   +3 more sources

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response [PDF]

open access: goldApplied Sciences, 2023
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban   +3 more
doaj   +2 more sources

Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]

open access: yesSensors
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz   +5 more
doaj   +2 more sources

An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM

open access: greenInternational Conference on Software, Telecommunications and Computer Networks, 2022
The industry of shared self-driving is increasingly interested in the Message Queuing Telemetry Transport (MQTT) solution to develop and evaluate their autonomous and shared mobility services.
Mohamed Hadded   +4 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy