2013
DOI: 10.7763/ijfcc.2013.v2.126
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining Approach in Security Information and Event Management

Abstract: This paper gives an overview of data mining field& security information event management system. We will seehow various data mining techniques can be used in securityinformation and event management system to enhance thecapabilities of the system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…2. Data mining architecture [12] agencies or companies without SIEM can generate fast and concise reports, as required for their reports to comply. In the current environment, the reporting of each device is essential to periodically recover data manually from each device and to ensure a central configuration for the generation of a report can be created.…”
Section: Benefits Of Siemmentioning
confidence: 99%
See 1 more Smart Citation
“…2. Data mining architecture [12] agencies or companies without SIEM can generate fast and concise reports, as required for their reports to comply. In the current environment, the reporting of each device is essential to periodically recover data manually from each device and to ensure a central configuration for the generation of a report can be created.…”
Section: Benefits Of Siemmentioning
confidence: 99%
“…All raw data can be processed through a data mining technique. According to Zope et al, [12], this technique can quickly be implemented on existing software platforms and hardware platforms for enhancing the value of existing information resources. It is the process of examining data from several angles and synthesizing it into meaningful knowledge.…”
Section: Mining Processmentioning
confidence: 99%
“…Intrusion detection system's accuracy was improved by correlating data among different logs [3,4]. Different attacks were reflected in different logs and argued that some attacks were not evident when a single log was analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, management of security systems in the enterprise has been widespread, including those related to personnel, based on the methods of data mining. In particular, Zope A. R., Vidhate A., and Harale N. (2013) offer an overview of the various techniques of data mining for solving the problems of information security in the enterprise. The most commonly used implementations are firewalls that operate on the basis of set rules to protect the network against unauthorized access, and spam filtering systems and undesirable software applications in the letters, based on the simplest of which is the Bayesian rule.…”
mentioning
confidence: 99%