XAI for cybersecurity: state of the art, challenges, open issues and future directions
In the past few years, artificial intelligence (AI) techniques have been implemented in almost
all verticals of human life. However, the results generated from the AI models often lag …
all verticals of human life. However, the results generated from the AI models often lag …
Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning
AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
Combat security alert fatigue with ai-assisted techniques
The main challenge for security information and event management (SIEM) is to find critical
security incidents among a huge number of false alerts generated from separate security …
security incidents among a huge number of false alerts generated from separate security …
Breaking alert fatigue: Ai-assisted siem framework for effective incident response
Contemporary security information and event management (SIEM) solutions struggle to
identify critical security incidents effectively due to the overwhelming number of false alerts …
identify critical security incidents effectively due to the overwhelming number of false alerts …
Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis
Security Incident and Event Manager (SIEM) is a security management approach designed
to identify possible threats within a real-time enterprise environment. The main challenge for …
to identify possible threats within a real-time enterprise environment. The main challenge for …
Text mining for security threat detection discovering hidden information in unstructured log messages
The exponential growth of unstructured messages generated by the computer systems and
applications in modern computing environment poses a significant challenge in managing …
applications in modern computing environment poses a significant challenge in managing …
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring
A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …
the network for malicious activities. These systems are capable of detecting a wide range of …
Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent
JR Nandaputra, P Sukarno, AA Wardana - Proceedings of the 2024 10th …, 2024 - dl.acm.org
This research builds a realtime and multi-agent system to handle Distributed Denial of
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …
Multi-step attack pattern detection on normalized event logs
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of
attack techniques can be observed. Many of these attacks are performed in multiple steps to …
attack techniques can be observed. Many of these attacks are performed in multiple steps to …
Normalizing security events with a hierarchical knowledge base
An important technique for attack detection in complex company networks is the analysis of
log data from various network components. As networks are growing, the number of …
log data from various network components. As networks are growing, the number of …