On vulnerability and security log analysis: A systematic literature review on recent trends
J Svacina, J Raffety, C Woodahl, B Stone… - Proceedings of the …, 2020 - dl.acm.org
Log analysis is a technique of deriving knowledge from log files containing records of events
in a computer system. A common application of log analysis is to derive critical information …
in a computer system. A common application of log analysis is to derive critical information …
A survey on forensic investigation of operating system logs
H Studiawan, F Sohel, C Payne - Digital Investigation, 2019 - Elsevier
Event logs are one of the most important sources of digital evidence for forensic
investigation because they record essential activities on the system. In this paper, we …
investigation because they record essential activities on the system. In this paper, we …
Machine learning based intrusion detection system
A Halimaa, K Sundarakantham - 2019 3rd International …, 2019 - ieeexplore.ieee.org
In order to examine malicious activity that occurs in a network or a system, intrusion
detection system is used. Intrusion Detection is software or a device that scans a system or a …
detection system is used. Intrusion Detection is software or a device that scans a system or a …
[HTML][HTML] Anomaly detection for space information networks: A survey of challenges, techniques, and future directions
Abstract Space anomaly detection plays a critical role in safeguarding the integrity and
reliability of space systems amid the rising tide of threats. This survey aims to deepen …
reliability of space systems amid the rising tide of threats. This survey aims to deepen …
Data-driven decision support for optimizing cyber forensic investigations
Cyber attacks consisting of several attack actions can present considerable challenge to
forensic investigations. Consider the case where a cybersecurity breach is suspected …
forensic investigations. Consider the case where a cybersecurity breach is suspected …
Anomaly detection in operating system logs with deep learning-based sentiment analysis
H Studiawan, F Sohel, C Payne - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The purpose of sentiment analysis is to detect an opinion or polarity in text data. We can
apply such an analysis to detect negative sentiment, which represents the anomalous …
apply such an analysis to detect negative sentiment, which represents the anomalous …
Sentiment analysis in a forensic timeline with deep learning
H Studiawan, F Sohel, C Payne - IEEE Access, 2020 - ieeexplore.ieee.org
A forensic investigator creates a timeline from a forensic disk image after an occurrence of a
security incident. This procedure aims to acquire the time for all events identified from the …
security incident. This procedure aims to acquire the time for all events identified from the …
Anomaly detection in a forensic timeline with deep autoencoders
H Studiawan, F Sohel - Journal of Information Security and Applications, 2021 - Elsevier
An investigator needs to analyze a forensic timeline after a cybersecurity incident has
occurred. Log entries from various sources are used to generate a forensic timeline. Finding …
occurred. Log entries from various sources are used to generate a forensic timeline. Finding …
Formal concept analysis approach to understand digital evidence relationships
The number of cyber attacks is constantly increasing daily, which demands organizations to
respond quickly and adequately to security incidents. Digital forensics plays an essential …
respond quickly and adequately to security incidents. Digital forensics plays an essential …
[HTML][HTML] Forensics for multi-stage cyber incidents: Survey and future directions
The increase in the complexity and sophistication of multi-stage cyber attacks, such as
advanced persistent threats, paired with the large volume of data produced by modern …
advanced persistent threats, paired with the large volume of data produced by modern …