2015
DOI: 10.1016/j.inffus.2013.04.009
|View full text |Cite
|
Sign up to set email alerts
|

Providing SIEM systems with self-adaptation

Abstract: If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 48 publications
0
8
0
1
Order By: Relevance
“…(2) Other Preprocessing Steps e authors in [15] used neural networks as an event classifier within SIEM systems. e classifier, called CONTEXTUAL, is used with another subsystem called GENIAL based on genetic programming to improve the correlation engine of SIEM systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Other Preprocessing Steps e authors in [15] used neural networks as an event classifier within SIEM systems. e classifier, called CONTEXTUAL, is used with another subsystem called GENIAL based on genetic programming to improve the correlation engine of SIEM systems.…”
Section: Related Workmentioning
confidence: 99%
“…Model Dataset Accuracy (%) El Hajji et al [9] NN with best cost and training function NSL-KDD 81.8 Javaid et al [10] Sparse autoencoder with SMR NSL-KDD 78.06 Gurung et al [11] Sparse autoencoder with LR NSL-KDD 87.2 Yin et al [12] RNN based IDS NSL-KDD 81.29 Chouhan et al [13] CBR-CNN based IDS NSL-KDD 89.41 Maddikunta et al [14] DNN with PCA-GWO Kaggle dataset 99.9 Suarez-Tangil et al [15] NN and GP --Ussath et al [16] RNN and NN -89 Chiba et al [17] NN KDD 99.62 Bhattacharya et al [18] PCA-firefly based XGBoost Kaggle dataset 99.9 Gadekallu et al [19] Naive Bayes Kaggle and CERT-In repositories 99.9…”
Section: Referencementioning
confidence: 99%
“…We believe that two-tier architecture is more practical and widely deployed for enterprise networks where critical security-related information is collected into an inside server. For example, enterprise networks generally have a centralized log collection system, called enterprise security management (ESM) or security information and event management (SIEM) [4]. As a central coordinator and monitoring agents can be supervised by the same authority, no monitoring information is open to outside.…”
Section: Problem Definitionmentioning
confidence: 99%
“…The recent work of Suarez-Tangil et al [96] discusses typical problems in the domain of Security Information, addressed with an Event Management paradigm (SIEM) for intrusion detection with self-adaptive systems. Machine learning is applied for rule extraction to classify reported events accordingly to a contextbased pattern definition of attacks.…”
Section: Situation Assessmentmentioning
confidence: 99%