XAI for cybersecurity: state of the art, challenges, open issues and future directions

G Srivastava, RH Jhaveri, S Bhattacharya… - arXiv preprint arXiv …, 2022 - arxiv.org
In the past few years, artificial intelligence (AI) techniques have been implemented in almost
all verticals of human life. However, the results generated from the AI models often lag …

Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning

AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …

Combat security alert fatigue with ai-assisted techniques

T Ban, N Samuel, T Takahashi, D Inoue - Proceedings of the 14th Cyber …, 2021 - dl.acm.org
The main challenge for security information and event management (SIEM) is to find critical
security incidents among a huge number of false alerts generated from separate security …

Breaking alert fatigue: Ai-assisted siem framework for effective incident response

T Ban, T Takahashi, S Ndichu, D Inoue - Applied Sciences, 2023 - mdpi.com
Contemporary security information and event management (SIEM) solutions struggle to
identify critical security incidents effectively due to the overwhelming number of false alerts …

Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis

ME Aminanto, T Ban, R Isawa, T Takahashi… - IEEE Access, 2020 - ieeexplore.ieee.org
Security Incident and Event Manager (SIEM) is a security management approach designed
to identify possible threats within a real-time enterprise environment. The main challenge for …

Text mining for security threat detection discovering hidden information in unstructured log messages

C Suh-Lee, JY Jo, Y Kim - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
The exponential growth of unstructured messages generated by the computer systems and
applications in modern computing environment poses a significant challenge in managing …

Near-miss situation based visual analysis of SIEM rules for real time network security monitoring

A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …

Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent

JR Nandaputra, P Sukarno, AA Wardana - Proceedings of the 2024 10th …, 2024 - dl.acm.org
This research builds a realtime and multi-agent system to handle Distributed Denial of
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …

Multi-step attack pattern detection on normalized event logs

D Jaeger, M Ussath, F Cheng… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of
attack techniques can be observed. Many of these attacks are performed in multiple steps to …

Normalizing security events with a hierarchical knowledge base

D Jaeger, A Azodi, F Cheng, C Meinel - … Theory and Practice: 9th IFIP WG …, 2015 - Springer
An important technique for attack detection in complex company networks is the analysis of
log data from various network components. As networks are growing, the number of …