Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354239
|View full text |Cite
|
Sign up to set email alerts
|

Matched and Mismatched SOCs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(36 citation statements)
references
References 30 publications
0
36
0
Order By: Relevance
“…In their survey investigating threat intelligence, Tounsi et al [7] specifically call for methods to evaluate the quality of threat intelligence. This also applies to the wider organizational security operations center (SOC) context as low-quality CTI is identified to be a pivotal issue [12]. To the best of our knowledge, there is no respective academic work addressing these open issues.…”
Section: Related Workmentioning
confidence: 99%
“…In their survey investigating threat intelligence, Tounsi et al [7] specifically call for methods to evaluate the quality of threat intelligence. This also applies to the wider organizational security operations center (SOC) context as low-quality CTI is identified to be a pivotal issue [12]. To the best of our knowledge, there is no respective academic work addressing these open issues.…”
Section: Related Workmentioning
confidence: 99%
“…Tools and procedure to support security analysts in incident response and network monitoring (such as Network Intrusion Detection Systems (NIDS) and Security Information and Event Management (SIEM)) are at the core of modern security monitoring in operational settings. Security Operation Centers (SOCs) are the center of monitoring operations in medium or large organizations, either internally or outsourced to service providers [16,20]. SOCs are organized hierarchically in (generally three) tiers [20], where analysts with different skills and expertise monitor the network activity and take action against a threat.…”
Section: Security Monitoring Operationsmentioning
confidence: 99%
“…The growing importance of effective security monitoring solutions calls for appropriate measures of their effectiveness. The operation of Security Operation Centers (SOCs) is the recommended best practice to which large and medium-size enterprises rely for the detection, notification, and ultimately response to cybersecurity incidents [16,20]. Yet, the average time for detecting an attack ranges between several weeks to years [36].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations