2018
DOI: 10.1007/978-3-030-01177-2_82
|View full text |Cite
|
Sign up to set email alerts
|

A BI Solution to Identify Vulnerabilities and Detect Real-Time Cyber-Attacks for an Academic CSIRT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…In Russia, Krivo executed a study, whose objective was to provide effective monitoring of security incidents, through a system of key performance indicators (KPIs), which worked with a sample composed of 5,427 incident reports, where the impact of certain measures was tracked through data management tools, concluding that the BI tool allowed to obtain a set of dashboards and a visual-descriptive analysis of a wide data information [17]. In addition, Reyes conducted a study in Ecuador, focused on the process of BI technology, which allowed the reduction of malicious activities in the system, for this the Ralph Kimball method was used, encompassing the ETL and online analytical processing (OLAP) process, also the sample was composed of 54 data obtained in real time, resulting in the BI managed to improve the degree of security of the institutions, through the rapid processing of information [18], which allowed the real-time visualization of incidents that may occur in the network, in order to establish control measures. Finally, in the United States, a study was conducted on government security for the prevention of criminal actions in consumers through the use of technology that helps in the prediction of crimes, taking into account 2,142,865 incidents from 2003-2017 in the United States.…”
Section: Related Workmentioning
confidence: 99%
“…In Russia, Krivo executed a study, whose objective was to provide effective monitoring of security incidents, through a system of key performance indicators (KPIs), which worked with a sample composed of 5,427 incident reports, where the impact of certain measures was tracked through data management tools, concluding that the BI tool allowed to obtain a set of dashboards and a visual-descriptive analysis of a wide data information [17]. In addition, Reyes conducted a study in Ecuador, focused on the process of BI technology, which allowed the reduction of malicious activities in the system, for this the Ralph Kimball method was used, encompassing the ETL and online analytical processing (OLAP) process, also the sample was composed of 54 data obtained in real time, resulting in the BI managed to improve the degree of security of the institutions, through the rapid processing of information [18], which allowed the real-time visualization of incidents that may occur in the network, in order to establish control measures. Finally, in the United States, a study was conducted on government security for the prevention of criminal actions in consumers through the use of technology that helps in the prediction of crimes, taking into account 2,142,865 incidents from 2003-2017 in the United States.…”
Section: Related Workmentioning
confidence: 99%
“…The work [18] introduces a system for automated report generation for university CERT teams. However this work does not provide proposals for measures for problem solving.…”
Section: Related Workmentioning
confidence: 99%