On vulnerability and security log analysis: A systematic literature review on recent trends

J Svacina, J Raffety, C Woodahl, B Stone… - Proceedings of the …, 2020 - dl.acm.org
Log analysis is a technique of deriving knowledge from log files containing records of events
in a computer system. A common application of log analysis is to derive critical information …

A survey on forensic investigation of operating system logs

H Studiawan, F Sohel, C Payne - Digital Investigation, 2019 - Elsevier
Event logs are one of the most important sources of digital evidence for forensic
investigation because they record essential activities on the system. In this paper, we …

Machine learning based intrusion detection system

A Halimaa, K Sundarakantham - 2019 3rd International …, 2019 - ieeexplore.ieee.org
In order to examine malicious activity that occurs in a network or a system, intrusion
detection system is used. Intrusion Detection is software or a device that scans a system or a …

[HTML][HTML] Anomaly detection for space information networks: A survey of challenges, techniques, and future directions

A Diro, S Kaisar, AV Vasilakos, A Anwar, A Nasirian… - Computers & …, 2024 - Elsevier
Abstract Space anomaly detection plays a critical role in safeguarding the integrity and
reliability of space systems amid the rising tide of threats. This survey aims to deepen …

Data-driven decision support for optimizing cyber forensic investigations

A Nisioti, G Loukas, A Laszka… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber attacks consisting of several attack actions can present considerable challenge to
forensic investigations. Consider the case where a cybersecurity breach is suspected …

Anomaly detection in operating system logs with deep learning-based sentiment analysis

H Studiawan, F Sohel, C Payne - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The purpose of sentiment analysis is to detect an opinion or polarity in text data. We can
apply such an analysis to detect negative sentiment, which represents the anomalous …

Sentiment analysis in a forensic timeline with deep learning

H Studiawan, F Sohel, C Payne - IEEE Access, 2020 - ieeexplore.ieee.org
A forensic investigator creates a timeline from a forensic disk image after an occurrence of a
security incident. This procedure aims to acquire the time for all events identified from the …

Anomaly detection in a forensic timeline with deep autoencoders

H Studiawan, F Sohel - Journal of Information Security and Applications, 2021 - Elsevier
An investigator needs to analyze a forensic timeline after a cybersecurity incident has
occurred. Log entries from various sources are used to generate a forensic timeline. Finding …

Formal concept analysis approach to understand digital evidence relationships

P Sokol, Ľ Antoni, O Krídlo, E Marková… - International Journal of …, 2023 - Elsevier
The number of cyber attacks is constantly increasing daily, which demands organizations to
respond quickly and adequately to security incidents. Digital forensics plays an essential …

[HTML][HTML] Forensics for multi-stage cyber incidents: Survey and future directions

A Nisioti, G Loukas, A Mylonas, E Panaousis - … Science International: Digital …, 2023 - Elsevier
The increase in the complexity and sophistication of multi-stage cyber attacks, such as
advanced persistent threats, paired with the large volume of data produced by modern …