Essays about: "SIEM"

Showing result 1 - 5 of 8 essays containing the word SIEM.

  1. 1. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  2. 2. A Real- time Log Correlation System for Security Information and Event Management

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Clémence Dubuc; [2021]
    Keywords : Correlation; SIEM; Security Logs; Apache Spark; Elastic Search; Korrelation; SIEM; Säkerhetsloggar; Apache Spark; Elastic Search;

    Abstract : The correlation of several events in a period of time is a necessity for a threat detection platform. In the case of multistep attacks (attacks characterized by a sequence of executed commands), it allows detecting the different steps one by one and correlating them to raise an alert. READ MORE

  3. 3. Research of methods and algorithms of insider detection in a computer network using machine learning technologies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Dmitrii Pelevin; [2021]
    Keywords : IPS; IDS; UBA; NoSQL; Information Security;

    Abstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE

  4. 4. Identifying Challenges in Cybersecurity Data Visualization Dashboards

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Patrick Shirazi; [2020]
    Keywords : Cybersecurity visualization; Security visualization; security dashboards; Delphi technique;

    Abstract : Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. READ MORE

  5. 5. Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gabriel Wierzbieniec; [2018]
    Keywords : Security Monitoring; SIEM; Log Management; SOC; Threat Intelligence; Security Analytics;

    Abstract : Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. READ MORE