2017
DOI: 10.1007/s10586-017-1317-2
|View full text |Cite
|
Sign up to set email alerts
|

Visualization of security event logs across multiple networks and its application to a CSOC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
0
4
0
1
Order By: Relevance
“…Considering literature about data collection specifically for SOCs, there are only two notable papers: [111] and [22]. This is probably because most SOCs deploy a software solution responsible for collecting, processing, analyzing, and displaying events and alerts [112] and thus data collection is addressed in a more technical context. Bridges et al [111] conduct interviews with 13 professionals from five different SOCs to discover the current state-of-the-art and future directions for host-based data collection.…”
Section: ) Preparationmentioning
confidence: 99%
See 2 more Smart Citations
“…Considering literature about data collection specifically for SOCs, there are only two notable papers: [111] and [22]. This is probably because most SOCs deploy a software solution responsible for collecting, processing, analyzing, and displaying events and alerts [112] and thus data collection is addressed in a more technical context. Bridges et al [111] conduct interviews with 13 professionals from five different SOCs to discover the current state-of-the-art and future directions for host-based data collection.…”
Section: ) Preparationmentioning
confidence: 99%
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…The VisIDAC [11] system enables real-time visualisation of 3D data of security event log collection detected by intrusion detection systems installed in many networks. Event data are displayed in a graphical form on three panels: for global source networks, target networks and global destination networks.…”
Section: Tabs Switch Views Of the Applicationmentioning
confidence: 99%
“…System VisIDAC [32] umożliwia w czasie rzeczywistym wizualizacje 3D danych o zdarzeniach dotyczących cyberbezpieczeństwa, zebranych przez systemy wykrywania włamań zainstalowane w różnych sieciach. Dane o zdarzeniach są wyświetlane w postaci graficznej na trzech panelach: dla wejściowego, wyjściowego i docelowego ruchu sieciowego.…”
unclassified