Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

SieveQ: A Layered BFT Protection System for Critical Services

M Garcia, N Neves, A Bessani - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Firewalls play a crucial role in assuring the security of today's critical infrastructures, forming
a first line of defense by being placed strategically at the front-end of the networks …

Identification of critical situations via event processing and event trust analysis

ML Itria, M Kocsis-Magyar, A Ceccarelli… - … and Information Systems, 2017 - Springer
In crisis management systems, situational awareness is usually at the basis of guiding the
intervention process, and it is required to rapidly process data acquired from information …

A high-level domain-specific language for SIEM (design, development and formal verification)

A Nazir, M Alam, SUR Malik, A Akhunzada… - Cluster …, 2017 - Springer
Organizations deploy security information and event management (SIEM) systems for
centralized management of security events. The real-time security monitoring capability of …

Cloud DDoS detection and defense system using complex event processing

BSK Devi, T Subbulakshmi - 2021 5th International Conference …, 2021 - ieeexplore.ieee.org
Distributed Denial of Service attacks is the predominant targeted cyber-attack on the cloud
infrastructure which has now evolved as the persistent and more sophisticated attack. DDoS …

A multi-layer anomaly detector for dynamic service-based systems

A Ceccarelli, T Zoppi, M Itria, A Bondavalli - Computer Safety, Reliability …, 2015 - Springer
Revealing anomalies to support error detection in complex systems is a promising approach
when traditional detection mechanisms (eg, based on event logs, probes and heartbeats) …

Big data complex event processing for internet of things provenance: benefits for audit, forensics, and safety

M Underwood - Cyber‐Assurance for the Internet of Things, 2016 - Wiley Online Library
Abstract Some Internet of Things (IoT) subsystems will be far less robust than others.
Systems that rely on these sensors require considerable knowledge about the sensors, their …

Event-driven principles and complex event processing for self-adaptive network analysis and surveillance systems

R Gad - 2015 - rodin.uca.es
Event-driven approaches and Complex Event Processing (CEP) have the potential to aid in
tackling the complex requirements and challenges of monitoring contemporary computer …

Gestión de la Seguridad de la Información de la Infraestructura de Red Datos de la Minera Shahuindo Mediante Ossim y Cobit

TL Luján Flores, VE Huancas Samillán - 2023 - repositorio.unprg.edu.pe
Uno de los problemas que hoy en día tienen las empresas que soportan sus procesos
sobre tecnologías de la información y las comunicaciones es la gestión que realizan sobre …

[PDF][PDF] Distributed log analysis for scenario-based detection of multi-step attacks and generation of near-optimal defense recommendations

K Kaynar - 2017 - depositonce.tu-berlin.de
Detecting related, ongoing actions of attackers is significant for providing a complete
situational assessment of security and determining the most effective reactive defense …