A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise

Network Security - Tập 2021 - Trang 7-16 - 2021
Sivaraman Eswaran1, Aruna Srinivasan1, Prasad Honnavalli1
1PES University, Bangalore

Tóm tắt

IT functions in organisations produce enormous quantities of data, logs and events. In the current IT world, handling a large amount of data is a challenging task and it is the responsibility of network administrators to transmit and store the data securely. If any data is disclosed or tampered with by an attacker, either locally or remotely, then the impact can be very high. To overcome this, firewall and intrusion detection system (IDS) and intrusion prevention system (IPS) solutions are used to verify all packets on the network.


Tài liệu tham khảo

Lin Ying, 2010, Third International Symposium on Intelligent Information Technology and Security Informatics Jiang Liu, 2012, International Conference on Control Engineering and Communication Technology Kim Yong-Ho, 2014, Multimedia Tools and Applications, 71, 685, 10.1007/s11042-012-1275-x Le Duc, 2020, International Journal of Network Management Zimba Aaron, 2012, International Journal on Information Technologies & Security, 2, 57 Cuckoo Sandbox — Automated Malware Analysis, home page; https://cuckoosandbox.org/ accessed March 2021 Dog Spike, 2016, IEEE International Conference on Computer Communication and Networks Mansfield-Devine Steve, 2017, Computer Fraud & Security Gazet Alexandre, 2010, Journal of Computer Virology, 6, 77, 10.1007/s11416-008-0092-2 Moussaileb Routa, 2019, International Symposium on Foundations and Practice of Security Anumol ET, 2015, Intelligent Computing, Communication and Devices, 231, 10.1007/978-81-322-2012-1_24 Menon Rakesh, 2015, Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Oliner Adam, 2015, Communications of the ACM, 55, 55, 10.1145/2076450.2076466 Krizak Paul, 2010, LISA ‘10: 24th Large Installation System Administration Conference Rajan Sheena, 2020, International Conference on Innovative Computing & Communications Mallissery Sanoop, 2011, International Conference on Computational Intelligence and Information Technology, 662, 10.1007/978-3-642-25734-6_114 NiranjanRaja M Siva, 2017, Procedia Computer Science, 115, 580, 10.1016/j.procs.2017.09.117 Bilge Leyla, 2012, 28th Annual Computer Security Applications Conference Murphey Rich, 2010, Digital Investigation, 4, 92, 10.1016/j.diin.2007.06.012 Kim Ikkyun, 2009, International Conference on Advanced Communication Technology Patel Reshma, 2011, International Conference on Computer Communication and Networks, 79