SIEM with LSA Technique for Threat Identification

被引:0
|
作者
Dairinram, Pavarit [1 ]
Wongsawang, Damras [1 ]
Pengsart, Pagaporn [1 ]
机构
[1] Mahidol Univ, Fac Informat & Commun Technol, Bangkok 10700, Thailand
关键词
component; Security Information and Event Management; Latent Semantic Ankysis; Threat identification; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Is voice transformation a threat to speaker identification?
    Jin, Qin
    Toth, Arthur R.
    Black, Alan W.
    Schultz, Tanja
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 4845 - 4848
  • [22] Personality, Threat Identification and Emotional Processing
    Leikas, Sointu
    Lindeman, Marjaana
    [J]. EUROPEAN JOURNAL OF PERSONALITY, 2009, 23 (06) : 455 - 474
  • [23] Threat to gender representation: Identity and identification
    Cramer, P
    [J]. JOURNAL OF PERSONALITY, 1998, 66 (03) : 335 - 357
  • [24] Brown Threat: Identification in the Security State
    Valdivia, Angharad N.
    [J]. JOURNAL OF COMMUNICATION, 2017, 67 (04) : E9 - E11
  • [25] Threat identification and prediction system (TIPS)
    Benjamin, P
    Koola, P
    Ramachandran, S
    Mayer, R
    [J]. IKE '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE ENGNINEERING, 2004, : 20 - 27
  • [26] Protection Without Detection: A Threat Mitigation Technique
    White, Joshua
    McCoy, Joseph R.
    Ratazzi, Paul
    [J]. DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2012, 2012, 8405
  • [28] Research of Threat Identification Based on Bayesian Networks
    Li Man
    Feng Xinxi
    Chen Jiaoping
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5336 - 5338
  • [29] Risk Identification: From Requirements to Threat Models
    Wirtz, Roman
    Heisel, Maritta
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 385 - 396
  • [30] Integrated optic chip for laser threat identification
    McAulay, Alastair D.
    [J]. SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION XIX, 2010, 7697