2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) 2022
DOI: 10.23919/mipro55190.2022.9803394
|View full text |Cite
|
Sign up to set email alerts
|

Detecting network applications using firewall logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…This paper focuses on the use of a novel method to create logs containing attack-related records [ 2 ] and their use in combination with different anomaly detection methods to validate this approach [ 1 ]. The log generation method presented relies on real-world logs from the organization, augmented by domain knowledge, and eliminates the need for a dedicated testbed or installed security controls.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper focuses on the use of a novel method to create logs containing attack-related records [ 2 ] and their use in combination with different anomaly detection methods to validate this approach [ 1 ]. The log generation method presented relies on real-world logs from the organization, augmented by domain knowledge, and eliminates the need for a dedicated testbed or installed security controls.…”
Section: Discussionmentioning
confidence: 99%
“…This paper is an extension of two papers originally presented at the 17th International Conference on Telecommunications (ConTEL) © 2023 IEEE [ 1 ] and the 16th European Workshop on System Security [ 2 ]. Parts of this paper appeared in Proceedings of the 17th International Conference on Telecommunications (ConTEL) © 2023 IEEE [ 1 ] and Proceedings of the 16th European Workshop on System Security [ 2 ].…”
Section: Introductionmentioning
confidence: 99%