Landscape of automated log analysis: A systematic literature review and map** study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Tracing cve vulnerability information to capec attack patterns using natural language processing techniques

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Information, 2021 - mdpi.com
For effective vulnerability management, vulnerability and attack information must be
collected quickly and efficiently. A security knowledge repository can collect such …

Emerging cyber security challenges after COVID pandemic: a survey

A Choudhary, G Choudhary, K Pareek… - Journal of Internet …, 2022 - orbit.dtu.dk
In 2019, a virus infection, COVID-19, traveled across the oceans, gained foothold in many
countries, and started infecting the citizens of those countries. Soon, this virus was labeled a …

A framework for cyber threat intelligence extraction from raw log data

M Landauer, F Skopik, M Wurzenberger… - … Conference on Big …, 2019 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) rely on the availability and correctness of Indicators of
Compromise (IoC), ie, artifacts such as IP addresses that are known to correspond to …

Comparative evaluation of nlp-based approaches for linking capec attack patterns from cve vulnerability information

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Applied Sciences, 2022 - mdpi.com
Vulnerability and attack information must be collected to assess the severity of vulnerabilities
and prioritize countermeasures against cyberattacks quickly and accurately. Common …

Multi-source log parsing with pre-trained domain classifier

Y Liu, S Tao, W Meng, J Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Automated log analysis with AI technologies is commonly used in network, system, and
service operation and maintenance to ensure reliability and quality assurance. Log parsing …

Tracing capec attack patterns from cve vulnerability information using natural language processing technique

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - 2021 - scholarspace.manoa.hawaii.edu
To effectively respond to vulnerabilities, information must not only be collected efficiently and
quickly but also the vulnerability and the attack techniques must be understood. A security …

Hetemsd: A big data analytics framework for targeted cyber‐attacks detection using heterogeneous multisource data

A Ju, Y Guo, Z Ye, T Li, J Ma - Security and Communication …, 2019 - Wiley Online Library
In the current enterprise network environment, multistep targeted cyber‐attacks with
concealment and advanced characteristics have become the main threat. Multisource …

A tool for assisting in the forensic investigation of cyber-security incidents

K Touloumis, A Michalitsi-Psarrou… - … Conference on Big …, 2022 - ieeexplore.ieee.org
The exponential growth of networking capabilities including the Internet of Things (IoT), has
led to an outburst of cyberattacks. Many well-documented cyber-attacks have targeted …