2017
DOI: 10.1016/j.jisa.2016.05.005
|View full text |Cite
|
Sign up to set email alerts
|

A collaborative cyber incident management system for European interconnected critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(33 citation statements)
references
References 8 publications
0
33
0
Order By: Relevance
“…We also identified further proposals of SOC architectures within the relevant literature, focusing on SOCs for specific use cases. Settani et al [47] describe the implementation of a SOC architecture for critical infrastructure providers. Tafazzoli and Grakani propose an architecture for processing events in an OpenStack environment to detect attacks in the cloud on a very superficial level [48].…”
Section: ) Technological Architectures and Designsmentioning
confidence: 99%
“…We also identified further proposals of SOC architectures within the relevant literature, focusing on SOCs for specific use cases. Settani et al [47] describe the implementation of a SOC architecture for critical infrastructure providers. Tafazzoli and Grakani propose an architecture for processing events in an OpenStack environment to detect attacks in the cloud on a very superficial level [48].…”
Section: ) Technological Architectures and Designsmentioning
confidence: 99%
“…The Security Controller is the smart entity that automates as much as possible all security workflows. According to on-going initiatives [8], the main role The second, and more challenging, is the derivation of the necessary information from an on-going attack or offline analysis [14,15]. While the former is already addressed by several standardization initiatives (e.g., STIX), the latter…”
Section: Security Controllermentioning
confidence: 99%
“…In order to solve this problem, considering the choices of other users with similar systems, also through the use of new predictive algorithm, a solution is presented to the user. In the literature there are many examples of collaborative systems [25][26][27][28][29]. Our choice is different because in the software platform we implement algorithms able (i) to predict the user choices of risk values starting from what other users did before, (ii) understanding which users are more similar to the new one.…”
Section: Predictionmentioning
confidence: 99%