Academic literature on the topic 'Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events"

1

Venkat, Sumanth Guduru. "Integrating Salesforce with Cybersecurity Tools for Enhanced Data Protection (Chronicle SIEM)." European Journal of Advances in Engineering and Technology 11, no. 8 (2024): 27–31. https://doi.org/10.5281/zenodo.13789978.

Full text
Abstract:
In the light of evolving advanced threats, it is imperative that organizations develop proper and robust security frameworks for safeguarding their information assets. Especially, Salesforce, a best of breed CRM ahead, is more easily attacked since this platform processes countless customer data. Consequently, protection of this data with traditional security measures may not be adequate. On the one hand, the implementation of Salesforce in conjunction with Chronicle Security Information and Event Management (SIEM), which is a contemporary security solution by Google Cloud, provides the most c
APA, Harvard, Vancouver, ISO, and other styles
2

Bezas, Konstantinos, and Foteini Filippidou. "Comparative Analysis of Open Source Security Information & Event Management Systems (SIEMs)." Indonesian Journal of Computer Science 12, no. 2 (2023): 443–68. http://dx.doi.org/10.33022/ijcs.v12i2.3182.

Full text
Abstract:
A Security Information and Event Management system (SIEM) is a tool used to collect, analyze, normalize and correlate data from various devices to identify potential cyber threats almost in real-time. SIEM provides a unified approach to security issues through two zones: Security Information Management (SIM) and Security Event Management (SEM). SIM deals with managing logs and reporting, while SEM deals with event management and real-time monitoring. SIEM tools collect data events in a central unit from various devices, normalize their format, analyze them, and generate reports and alerts. SIE
APA, Harvard, Vancouver, ISO, and other styles
3

Gnatyuk, Sergiy, Rat Berdibayev, Viktoriia Sydorenko, Oksana Zhyharevych, and Tetiana Smirnova. "SYSTEM FOR CYBER SECURITY EVENTS CORRELATION AND INCIDENT MANAGEMENT IN CRITICAL INFRASTRUCTURE OBJECTS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 176–96. http://dx.doi.org/10.28925/2663-4023.2023.19.176196.

Full text
Abstract:
Modern information infrastructure consists of a large number of systems and components that require constant monitoring and control. To identify, analyze and eliminate possible cyber threats, it is recommended to use a single common solution - the so-called SIEM systems. SIEM technology collects event log data, detects unusual activity through real-time analysis, identifies threats, generates alerts, and suggests appropriate action scenarios. Today, the number and quality of SIEM systems has grown significantly, and the latest technologies of artificial intelligence, the Internet of Things, an
APA, Harvard, Vancouver, ISO, and other styles
4

Issenoro, Herlina Trisnawati, Sakius Octavianus Tarigan, Novianti Madhona Faizah, and Veranita. "Perancangan dan Pengembangan Aplikasi Deteksi Anomali pada Jaringan Internet Gedung Disaster Recovery Center Badan Diklat Kejaksaan RI dengan Implementasi Sistem Manajemen Informasi dan Keamanan (SIEM) Berbasis Web." Jurnal Ilmu Komputer dan Teknologi Informasi 2, no. 1 (2025): 12–21. https://doi.org/10.35870/jikti.v2i1.1341.

Full text
Abstract:
This research develops an anomaly detection application for the internet network of the Disaster Recovery Center (DRC) building at the Training Agency of the Indonesian Prosecutor's Office (Badan Diklat Kejaksaan RI), implemented with Security Information and Event Management (SIEM) using the Python programming language. The resulting application aims to assist network administrators at the DRC in monitoring network communication flows and detecting potential threats to the system. The approach involves developing an application that enhances network security through anomaly detection and moni
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammed, Mustafa Khan. "Proactive Cyber Defense: Conducting Real-Time Monitoring and Analysis of Security Events Using SIEM Tools to Detect and Respond to Potential Security Incidents." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 3 (2024): 1–11. https://doi.org/10.5281/zenodo.13959577.

Full text
Abstract:
In an era of escalating cyber threats and the whooping growth of intelligent attack vectors, organizations are compelled to adopt proactive cyber defense to countermeasure cyber security threats. Proactive cyber defense entails real-time monitoring and analysis of security events using Security Information and Event Management (SIEM) tools. The main objective of this research paper is to discuss the implementation of SIEM tools for conducting real-time monitoring and analysis of security events to react to security incidents. The SIEM aggregates data from heterogeneous sources across an enterp
APA, Harvard, Vancouver, ISO, and other styles
6

Kasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.

Full text
Abstract:
This research aims to build upon a conceptual idea of consolidating all application security vulnerability data from monitoring, detection, and discovery tools into a physical system that allows for convergence of observation and response to an event that is a threat. Multiple application security testing and monitoring tools are deployed at different layers of an application architecture and capture activities that occur at that layer. This multi-layer data capture is disconnected without any analysis of data lineage from the externally exposed web attack surface to deep down into the applica
APA, Harvard, Vancouver, ISO, and other styles
7

BOLILYI, V. O., L. P. SUKHOVIRSKA та O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM". Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, № 2 (2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.

Full text
Abstract:
This study examines the Security Operations Center, which provides detection and analysis of cybersecurity, rapid response, and prevention of cyber attacks. Security Operations Center technologies are used to provide visibility and enable analysts to protect against attacks. The algorithm of presenting the topic «Security Center» during the teaching of the discipline «Security of programs and data» at the Volodymyr Vynnychenko Central Ukrainian State Pedagogical University is shown, namely the problems of implementation of event monitoring systems «Security information and event management», t
APA, Harvard, Vancouver, ISO, and other styles
8

Suchismita, Chatterjee. "Using SIEM and SOAR for Real-Time Cybersecurity Operations in Oil and Gas." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 2 (2020): 1–11. https://doi.org/10.5281/zenodo.14598693.

Full text
Abstract:
The oil and gas industry is a prime target for cyberattacks due to the critical infrastructure it controls and the high value of its data. This paper explores the evolving landscape of cyber threats facing the industry, including sophisticated attacks, ransomware, DDoS attacks, phishing, and insider threats. It delves into the challenges posed by the convergence of IT and OT systems, ICS vulnerabilities, supply chain attacks, and legacy systems.To address these threats, the paper examines the role of Security Information and Event Management (SIEM) and Security Orchestration, Automation, and R
APA, Harvard, Vancouver, ISO, and other styles
9

Hendra Setiawan and Wiwin Sulistyo. "SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox." International Journal of Engineering Technology and Natural Sciences 5, no. 2 (2023): 138–47. http://dx.doi.org/10.46923/ijets.v5i2.241.

Full text
Abstract:
Malware or malicious software is software or program code specifically designed to damage software on a computer or perform malicious activities. Malware is spread over the internet and includes viruses and other forms of malware. Losses caused by malware can take the form of financial losses or disruptions to business processes. Prevention of malware attacks can be achieved by analyzing the malware to find out how it works and what its characteristics are. This information can be utilized to define an Indicator of Compromise (IOC), which is stored in a Cyber Threat Intelligence (CTI) system d
APA, Harvard, Vancouver, ISO, and other styles
10

admin, admin. "AlertFusion-OptiNet: An Advanced SIEM Alert Management System for IoT Environments using CMRO and AlertQ-Net." Fusion: Practice and Applications 18, no. 2 (2025): 01–23. https://doi.org/10.54216/fpa.180201.

Full text
Abstract:
SIEM, which stands for Security Information and Event Management, is a collection of services and solutions that give businesses the capacity to gather, examine, and handle security-related data in real time from all areas of their IT infrastructure. This study presents AlertFusion-OptiNet, a sophisticated SIEM alert management architecture intended for effective alert handling and intrusion detection. The proposed CMRO algorithm (a hybrid of Coot Bird Optimization and Mug Ring Algorithm) is used to select the best features after the system integrates data from multiple sources (raw logs, netw
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events"

1

Ramalingam, Renugadevi, K. Arthi, M. Monica Bhavani, and T. Sunitha. "AI-Enhanced Security Information and Event Management (SIEM) System." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0563-9.ch005.

Full text
Abstract:
This chapter explores various deep learning methods for enhancing Security Information and Event Management (SIEM) systems. As cyber threats become increasingly sophisticated, traditional SIEM approaches often fall short in efficiently processing and analyzing vast amounts of security data. We investigate the application of deep learning techniques, such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and autoencoders, to improve threat detection, anomaly detection, and incident response capabilities. CNNs are leveraged for feature extraction from complex datasets, e
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events"

1

Mitkovskiy, Alexey, Andrey Ponomarev, and Andrey Proletarskiy. "SIEM-PLATFORM FOR RESEARCH AND EDUCATIONAL TASKS ON PROCESSING OF SECURITY INFORMATION EVENTS." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-143.

Full text
Abstract:
Nowadays, the technology of Security Information and Event Management (SIEM) becomes one of the most important research applications for advanced security threat detection in a complex enterprise environment. The underlying principles of every SIEM system is the aggregation of security events, captured from across an enterprise network and analysis of the gathered log data in real time through set of correlation rules to provide rapid response to security incidents. This article is about applying a unique practical method of teaching undergraduate students in the field of enterprise infrastruc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!