2016
DOI: 10.1002/sec.1647
|View full text |Cite
|
Sign up to set email alerts
|

A survey of IT early warning systems: architectures, challenges, and solutions

Abstract: With the advent of new technologies and various services provided in the context of computer networks, a large volume of data is being generated. The main challenge in this area is providing network protection services against various threats and vulnerabilities. So far, many techniques have been proposed to deal with these threats. All of these techniques pursue the same goal, preventing attackers from reaching their objectives. A solution based on early warning system(s) (EWSs) is what exactly security teams… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(30 citation statements)
references
References 26 publications
0
25
0
1
Order By: Relevance
“…Recently, researchers started focusing on networking and computational systems. In [6], Ramaki and Atani presented a survey of architectures and techniques for early warning threats in Information Technology (IT). The authors classified the early warning systems (EWS) in commercial or under research and development.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, researchers started focusing on networking and computational systems. In [6], Ramaki and Atani presented a survey of architectures and techniques for early warning threats in Information Technology (IT). The authors classified the early warning systems (EWS) in commercial or under research and development.…”
Section: Related Workmentioning
confidence: 99%
“…The authors classified the early warning systems (EWS) in commercial or under research and development. They pointed out a set of challenges, such as data collection, data correlation, and postevent data correlation [6]. The authors reinforced the need of designing proactive solutions to predict threats and attacks before they occur, using data analytics.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we need to create a higher-level view of the system's security state. Alert correlation accomplishes this high-level view of systems or networks by processing the alerts of the intrusion detection system [88,89]. In general, 2 or more IDS may cooperate to accomplish the following objectives:…”
Section: Multistep Attack Detection and Predictionmentioning
confidence: 99%
“…Methods of predictive analytics are a promising research direction in cybersecurity that would allow for a more proactive approach to security operations [2]. Predictions may serve as an early warning so that the defenders may learn about the threats in advance, set up proper countermeasures, and preemptively mitigate or completely prevent security incidents [6]. Numerous methods and approaches were proposed in the previous work with wildly * Corresponding author, email: husakm@ics.muni.cz varying goals and results [1].…”
Section: Introductionmentioning
confidence: 99%