An Analysis of Information Security Event Managers

被引:6
|
作者
Thakur, Kutub [1 ]
Kopecky, Sandra [1 ]
Nuseir, Moath [1 ]
Ali, Md Liakat [1 ]
Qiu, Meikang [1 ]
机构
[1] Pace Univ, Seidenberg Sch Comp Sci & Informat Syst, Pleasantville, NY 10570 USA
关键词
Security Information and Event Management; Cyber Security; Cyber Security Attack; Cyber Intelligence; Threat; Data analysis;
D O I
10.1109/CSCloud.2016.19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user; any variation from normal of abnormal activity could indicate that a threat is imminent and that your data or infrastructure is at risk. In the last several years, there has been a disturbing trend in which attackers are innovating much faster than the defenders. There has been a commercialization of malware with attack kits available through underground forums for anyone who wants to perpetrate any variety of attacks. Large botnets are available for rent, allowing attackers to send spam or launch DDos (distributed denial-of-service) attacks. Many attackers reuse malware and command and control (C & C) and methods, adapting their products over time to keep ahead of the anti-malware industry and security professionals. This paper surveys ESMs (Enterprise Security Managers) and cyber-attack case studies.
引用
收藏
页码:210 / 215
页数:6
相关论文
共 50 条
  • [21] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [22] Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation
    Sonmez, Ferda Ozdemir
    Gunel, Banu
    [J]. 2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 38 - 44
  • [23] A novel security information and event management system for enhancing cyber security in a hydroelectric dam
    Di Sarno, Cesario
    Garofalo, Alessia
    Matteucci, Ilaria
    Vallini, Marco
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 13 : 39 - 51
  • [24] Information security: Using a novel event-based approach
    Adaikkalavan, R
    Chakravarthy, S
    Liuzzi, R
    Wong, L
    [J]. IKE '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE ENGNINEERING, 2004, : 33 - 38
  • [25] Towards Visual Analytics Tasks for the Security Information and Event Management
    Novikova, Evgenia S.
    Bekeneva, Yana A.
    Shorov, Andrey V.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 90 - 93
  • [26] Agentless Approach for Security Information and Event Management in Industrial IoT
    Zahid, Huma
    Hina, Sadaf
    Hayat, Muhammad Faisal
    Shah, Ghalib A.
    [J]. ELECTRONICS, 2023, 12 (08)
  • [27] IMPORTANCE OF EVENT LOG MANAGEMENT TO ENSURE INFORMATION SYSTEM SECURITY
    Stanciu, Nicoleta
    [J]. METALURGIA INTERNATIONAL, 2013, 18 (02): : 144 - 149
  • [28] Analysis techniques for information security
    Datta, Anupam
    Jha, Somesh
    Li, Ninghui
    Melski, David
    Reps, Thomas
    [J]. Synthesis Lectures on Information Security, Privacy, and Trust, 2010, 2 (01): : 1 - 164
  • [29] Visual information analysis for security
    Tao, Dacheng
    Yuan, Yuan
    Shen, Jialie
    Huang, Kaiqi
    Li, Xuelong
    [J]. SIGNAL PROCESSING, 2009, 89 (12) : 2311 - 2312