Landscape of automated log analysis: A systematic literature review and map** study
Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …
systems. The main uses of log files have always been failure identification and root cause …
Alert-driven attack graph generation using s-pdfa
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …
to a network under observation. Such CTI currently requires extensive expert input for …
Tracing cve vulnerability information to capec attack patterns using natural language processing techniques
For effective vulnerability management, vulnerability and attack information must be
collected quickly and efficiently. A security knowledge repository can collect such …
collected quickly and efficiently. A security knowledge repository can collect such …
Emerging cyber security challenges after COVID pandemic: a survey
In 2019, a virus infection, COVID-19, traveled across the oceans, gained foothold in many
countries, and started infecting the citizens of those countries. Soon, this virus was labeled a …
countries, and started infecting the citizens of those countries. Soon, this virus was labeled a …
A framework for cyber threat intelligence extraction from raw log data
Intrusion Detection Systems (IDS) rely on the availability and correctness of Indicators of
Compromise (IoC), ie, artifacts such as IP addresses that are known to correspond to …
Compromise (IoC), ie, artifacts such as IP addresses that are known to correspond to …
Comparative evaluation of nlp-based approaches for linking capec attack patterns from cve vulnerability information
Vulnerability and attack information must be collected to assess the severity of vulnerabilities
and prioritize countermeasures against cyberattacks quickly and accurately. Common …
and prioritize countermeasures against cyberattacks quickly and accurately. Common …
Multi-source log parsing with pre-trained domain classifier
Automated log analysis with AI technologies is commonly used in network, system, and
service operation and maintenance to ensure reliability and quality assurance. Log parsing …
service operation and maintenance to ensure reliability and quality assurance. Log parsing …
Tracing capec attack patterns from cve vulnerability information using natural language processing technique
To effectively respond to vulnerabilities, information must not only be collected efficiently and
quickly but also the vulnerability and the attack techniques must be understood. A security …
quickly but also the vulnerability and the attack techniques must be understood. A security …
Hetemsd: A big data analytics framework for targeted cyber‐attacks detection using heterogeneous multisource data
A Ju, Y Guo, Z Ye, T Li, J Ma - Security and Communication …, 2019 - Wiley Online Library
In the current enterprise network environment, multistep targeted cyber‐attacks with
concealment and advanced characteristics have become the main threat. Multisource …
concealment and advanced characteristics have become the main threat. Multisource …
A tool for assisting in the forensic investigation of cyber-security incidents
The exponential growth of networking capabilities including the Internet of Things (IoT), has
led to an outburst of cyberattacks. Many well-documented cyber-attacks have targeted …
led to an outburst of cyberattacks. Many well-documented cyber-attacks have targeted …