SIEM with LSA Technique for Threat Identification

被引:0
|
作者
Dairinram, Pavarit [1 ]
Wongsawang, Damras [1 ]
Pengsart, Pagaporn [1 ]
机构
[1] Mahidol Univ, Fac Informat & Commun Technol, Bangkok 10700, Thailand
关键词
component; Security Information and Event Management; Latent Semantic Ankysis; Threat identification; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Novice Threat Model using SIEM System for Threat Assessment
    Khan, Arshad
    Khan, Rabia
    Nisar, Farhan
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 72 - 77
  • [2] SIEM and Threat Intelligence: Protecting Applications with Wazuh and TheHive
    Jumiaty, Benfano Soewito
    [J]. International Journal of Advanced Computer Science and Applications, 2024, 15 (09) : 239 - 251
  • [3] Detection of DoS attack and Zero Day Threat with SIEM
    Sornalakshmi, K.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1 - 7
  • [4] Augmenting the LSA Technique to Evaluate Ubicomp Environments
    Lopez-Lopez, Victor R.
    Escobedo, Lizbeth
    Trujillo, Leonardo
    Diaz-Ramirez, Victor H.
    [J]. NEO 2016: RESULTS OF THE NUMERICAL AND EVOLUTIONARY OPTIMIZATION WORKSHOP NEO 2016 AND THE NEO CITIES 2016 WORKSHOP, 2018, 731 : 45 - 64
  • [5] LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography
    Xu, Xiaojia
    Wang, Yongcai
    Xu, Lanling
    Li, Deying
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06): : 3670 - 3681
  • [6] Risk Identification Method for Cloud Computing Safety based on LSA-GCC and LSA-SAM
    Lin, Fan
    Zeng, Wenhua
    Wang, Yue
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (02): : 227 - 244
  • [7] OSPF failure identification based on LSA flooding analysis
    Hei, Yuichiro
    Ogishi, Tomohiko
    Ano, Shigehiro
    Hasegawa, Toru
    [J]. 2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2, 2007, : 717 - +
  • [8] Technique and the Threat of Deethicalization
    Sidnell, Jack
    [J]. SIGNS AND SOCIETY, 2021, 9 (03) : 343 - 365
  • [9] Enhancing Cloud Security-Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
    Tuyishime, Emmanuel
    Balan, Titus C.
    Cotfas, Petru A.
    Cotfas, Daniel T.
    Rekeraho, Alexandre
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [10] Optimization of OSPF LSA Flooding Process using Clustering Technique
    Anu, P.
    Vimala, S.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,