Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]
PLoS ONEThe proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor+3 more
doaj +3 more sources
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks [PDF]
arXiv, 2023Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them from reaching their final goals.
Hackländer, Louis+4 more
arxiv +4 more sources
Simple, Fast, and Accurate Cybercrime Detection on E-Government with Elastic Stack SIEM [PDF]
Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2023Increased public activity in cyberspace (Internet) during the Covid-19 pandemic has also increased cybercrime cases with various attack targets, including E-Government services. Cybercrime is hidden and occurs unnoticed in E-Government, so handling it is
Ichsan Yudhianto
core +4 more sources
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
arXiv, 2014Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge. However, they currently present several limitations that have to be overcome.
Alessia Garofalo+4 more
arxiv +6 more sources
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo+2 more
doaj +2 more sources
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
Applied Sciences, 2023With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime+4 more
doaj +2 more sources
Study of the applicability of the hierarchy analysis method for choosing a SIEM system
Безопасность информационных технологий, 2023The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya+2 more
doaj +3 more sources
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response [PDF]
Applied Sciences, 2023Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban+3 more
doaj +2 more sources
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]
SensorsAdvances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz+5 more
doaj +2 more sources
An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM
International Conference on Software, Telecommunications and Computer Networks, 2022The industry of shared self-driving is increasingly interested in the Message Queuing Telemetry Transport (MQTT) solution to develop and evaluate their autonomous and shared mobility services.
Mohamed Hadded+4 more
openalex +3 more sources