Essays about: "Security Information Event Management SIEM"
Found 4 essays containing the words Security Information Event Management SIEM.
-
1. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE
-
2. Feasibility to implement a SIEM based on Open-source applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As more and more things digitize, the need of logging events and managing these logs increases. To be able to makes sense of these logs, a (Security Information and Event Management) SIEM tool is commonly used both to correlate the events and as a tool to analyze the logs. READ MORE
-
3. A Real- time Log Correlation System for Security Information and Event Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The correlation of several events in a period of time is a necessity for a threat detection platform. In the case of multistep attacks (attacks characterized by a sequence of executed commands), it allows detecting the different steps one by one and correlating them to raise an alert. READ MORE
-
4. Research of methods and algorithms of insider detection in a computer network using machine learning technologies
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE