Results 251 to 260 of about 114,400 (283)

An Ontology-Based Model for SIEM Environments [PDF]

open access: possible, 2012
The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of ...
Nabil Hachem   +3 more
openaire   +1 more source

Collaborative Detection of SQL Injection Attacks using SIEM, Multi-Wazuh Agents, and Diverse Web Application Firewalls

2024 5th International Conference on Communications, Information, Electronic and Energy Systems (CIEES)
SQL injection attacks pose a significant threat to web applications and database systems. This study evaluates the effectiveness of integrating Security Information and Event Management (SIEM) with multi-Wazuh agents and diverse Web Application Firewalls
Mustaghfir Naufal Zaidan   +2 more
semanticscholar   +1 more source

Learning to love SIEM

Network Security, 2011
In the 1964 motion picture, Dr Strangelove or: How I Learned to Stop Worrying and Love the Bomb, a paranoid general played by Sterling Hayden is able to hack into a system and initiate a nuclear attack on the Soviet Union without the knowledge of his superiors.
openaire   +2 more sources

Analysis, Trends, and Utilization of Security Information and Event Management (SIEM) in Critical Infrastructures

2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS)
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats.
Sashwin K   +4 more
semanticscholar   +1 more source

Open source SIEM solutions for an enterprise

Information and Computer Security, 2022
Purpose The security of applications, systems and networks has always been the source of great concern for both enterprises and common users. Different security tools like intrusion detection system/intrusion prevention system and firewalls are ...
Aamna Tariq   +4 more
semanticscholar   +1 more source

Detection of Counter-Forensic Incidents Using Security Information and Incident Management (SIEM) Systems

2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), 2022
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu   +2 more
semanticscholar   +1 more source

The evolution and application of SIEM systems

Network Security, 2014
Anyone in a data-driven job like security, fraud, business intelligence, performance monitoring or any other data-dependant field will have heard about the latest phenomenon of ‘big data’. This exciting technological breakthrough promises to make business more efficient, identify anything that might harm it well ahead of time, and predict the future ...
openaire   +2 more sources

Security Information and Event Management (SIEM)

Encyclopedia of Cryptography, Security and Privacy, 2021
Manfred Vielberth
openaire   +2 more sources

SIEM with LSA technique for Threat identification

2013 19th IEEE International Conference on Networks (ICON), 2013
Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with ...
Pavarit Dairinram   +2 more
openaire   +2 more sources

Enhancing SIEM Technology to Protect Critical Infrastructures

2013
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based ...
COPPOLINO, Luigi   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy