Journal articles on the topic 'Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 28 journal articles for your research on the topic 'Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Venkat, Sumanth Guduru. "Integrating Salesforce with Cybersecurity Tools for Enhanced Data Protection (Chronicle SIEM)." European Journal of Advances in Engineering and Technology 11, no. 8 (2024): 27–31. https://doi.org/10.5281/zenodo.13789978.

Full text
Abstract:
In the light of evolving advanced threats, it is imperative that organizations develop proper and robust security frameworks for safeguarding their information assets. Especially, Salesforce, a best of breed CRM ahead, is more easily attacked since this platform processes countless customer data. Consequently, protection of this data with traditional security measures may not be adequate. On the one hand, the implementation of Salesforce in conjunction with Chronicle Security Information and Event Management (SIEM), which is a contemporary security solution by Google Cloud, provides the most c
APA, Harvard, Vancouver, ISO, and other styles
2

Bezas, Konstantinos, and Foteini Filippidou. "Comparative Analysis of Open Source Security Information & Event Management Systems (SIEMs)." Indonesian Journal of Computer Science 12, no. 2 (2023): 443–68. http://dx.doi.org/10.33022/ijcs.v12i2.3182.

Full text
Abstract:
A Security Information and Event Management system (SIEM) is a tool used to collect, analyze, normalize and correlate data from various devices to identify potential cyber threats almost in real-time. SIEM provides a unified approach to security issues through two zones: Security Information Management (SIM) and Security Event Management (SEM). SIM deals with managing logs and reporting, while SEM deals with event management and real-time monitoring. SIEM tools collect data events in a central unit from various devices, normalize their format, analyze them, and generate reports and alerts. SIE
APA, Harvard, Vancouver, ISO, and other styles
3

Gnatyuk, Sergiy, Rat Berdibayev, Viktoriia Sydorenko, Oksana Zhyharevych, and Tetiana Smirnova. "SYSTEM FOR CYBER SECURITY EVENTS CORRELATION AND INCIDENT MANAGEMENT IN CRITICAL INFRASTRUCTURE OBJECTS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 176–96. http://dx.doi.org/10.28925/2663-4023.2023.19.176196.

Full text
Abstract:
Modern information infrastructure consists of a large number of systems and components that require constant monitoring and control. To identify, analyze and eliminate possible cyber threats, it is recommended to use a single common solution - the so-called SIEM systems. SIEM technology collects event log data, detects unusual activity through real-time analysis, identifies threats, generates alerts, and suggests appropriate action scenarios. Today, the number and quality of SIEM systems has grown significantly, and the latest technologies of artificial intelligence, the Internet of Things, an
APA, Harvard, Vancouver, ISO, and other styles
4

Issenoro, Herlina Trisnawati, Sakius Octavianus Tarigan, Novianti Madhona Faizah, and Veranita. "Perancangan dan Pengembangan Aplikasi Deteksi Anomali pada Jaringan Internet Gedung Disaster Recovery Center Badan Diklat Kejaksaan RI dengan Implementasi Sistem Manajemen Informasi dan Keamanan (SIEM) Berbasis Web." Jurnal Ilmu Komputer dan Teknologi Informasi 2, no. 1 (2025): 12–21. https://doi.org/10.35870/jikti.v2i1.1341.

Full text
Abstract:
This research develops an anomaly detection application for the internet network of the Disaster Recovery Center (DRC) building at the Training Agency of the Indonesian Prosecutor's Office (Badan Diklat Kejaksaan RI), implemented with Security Information and Event Management (SIEM) using the Python programming language. The resulting application aims to assist network administrators at the DRC in monitoring network communication flows and detecting potential threats to the system. The approach involves developing an application that enhances network security through anomaly detection and moni
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammed, Mustafa Khan. "Proactive Cyber Defense: Conducting Real-Time Monitoring and Analysis of Security Events Using SIEM Tools to Detect and Respond to Potential Security Incidents." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 3 (2024): 1–11. https://doi.org/10.5281/zenodo.13959577.

Full text
Abstract:
In an era of escalating cyber threats and the whooping growth of intelligent attack vectors, organizations are compelled to adopt proactive cyber defense to countermeasure cyber security threats. Proactive cyber defense entails real-time monitoring and analysis of security events using Security Information and Event Management (SIEM) tools. The main objective of this research paper is to discuss the implementation of SIEM tools for conducting real-time monitoring and analysis of security events to react to security incidents. The SIEM aggregates data from heterogeneous sources across an enterp
APA, Harvard, Vancouver, ISO, and other styles
6

Kasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.

Full text
Abstract:
This research aims to build upon a conceptual idea of consolidating all application security vulnerability data from monitoring, detection, and discovery tools into a physical system that allows for convergence of observation and response to an event that is a threat. Multiple application security testing and monitoring tools are deployed at different layers of an application architecture and capture activities that occur at that layer. This multi-layer data capture is disconnected without any analysis of data lineage from the externally exposed web attack surface to deep down into the applica
APA, Harvard, Vancouver, ISO, and other styles
7

BOLILYI, V. O., L. P. SUKHOVIRSKA та O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM". Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, № 2 (2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.

Full text
Abstract:
This study examines the Security Operations Center, which provides detection and analysis of cybersecurity, rapid response, and prevention of cyber attacks. Security Operations Center technologies are used to provide visibility and enable analysts to protect against attacks. The algorithm of presenting the topic «Security Center» during the teaching of the discipline «Security of programs and data» at the Volodymyr Vynnychenko Central Ukrainian State Pedagogical University is shown, namely the problems of implementation of event monitoring systems «Security information and event management», t
APA, Harvard, Vancouver, ISO, and other styles
8

Suchismita, Chatterjee. "Using SIEM and SOAR for Real-Time Cybersecurity Operations in Oil and Gas." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 2 (2020): 1–11. https://doi.org/10.5281/zenodo.14598693.

Full text
Abstract:
The oil and gas industry is a prime target for cyberattacks due to the critical infrastructure it controls and the high value of its data. This paper explores the evolving landscape of cyber threats facing the industry, including sophisticated attacks, ransomware, DDoS attacks, phishing, and insider threats. It delves into the challenges posed by the convergence of IT and OT systems, ICS vulnerabilities, supply chain attacks, and legacy systems.To address these threats, the paper examines the role of Security Information and Event Management (SIEM) and Security Orchestration, Automation, and R
APA, Harvard, Vancouver, ISO, and other styles
9

Hendra Setiawan and Wiwin Sulistyo. "SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox." International Journal of Engineering Technology and Natural Sciences 5, no. 2 (2023): 138–47. http://dx.doi.org/10.46923/ijets.v5i2.241.

Full text
Abstract:
Malware or malicious software is software or program code specifically designed to damage software on a computer or perform malicious activities. Malware is spread over the internet and includes viruses and other forms of malware. Losses caused by malware can take the form of financial losses or disruptions to business processes. Prevention of malware attacks can be achieved by analyzing the malware to find out how it works and what its characteristics are. This information can be utilized to define an Indicator of Compromise (IOC), which is stored in a Cyber Threat Intelligence (CTI) system d
APA, Harvard, Vancouver, ISO, and other styles
10

admin, admin. "AlertFusion-OptiNet: An Advanced SIEM Alert Management System for IoT Environments using CMRO and AlertQ-Net." Fusion: Practice and Applications 18, no. 2 (2025): 01–23. https://doi.org/10.54216/fpa.180201.

Full text
Abstract:
SIEM, which stands for Security Information and Event Management, is a collection of services and solutions that give businesses the capacity to gather, examine, and handle security-related data in real time from all areas of their IT infrastructure. This study presents AlertFusion-OptiNet, a sophisticated SIEM alert management architecture intended for effective alert handling and intrusion detection. The proposed CMRO algorithm (a hybrid of Coot Bird Optimization and Mug Ring Algorithm) is used to select the best features after the system integrates data from multiple sources (raw logs, netw
APA, Harvard, Vancouver, ISO, and other styles
11

Djamalyanto, Meidi, Lilik Widyawati, Husain Husain, and I. Putu Hariyadi. "IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENCEGAH SERANGAN DEFACE PADA SERVER TERINTEGRASI TELEGRAM." Melek IT : Information Technology Journal 11, no. 1 (2025): 31–42. https://doi.org/10.30742/melekitjournal.v11i1.398.

Full text
Abstract:
Deface attacks are critical threats that disrupt server integrity and damage an organization's reputation. This research aims to design a Wazuh-based Security Information and Event Management (SIEM) system integrated with the Telegram Bot to detect, prevent, and provide real-time notifications against deface attacks. The method used is the Network Development Life Cycle (NDLC), which has three main stages: requirement analysis, system design, and prototype simulation. The implementation was conducted on a virtual environment using Ubuntu Server 22.04 as the Wazuh Manager and Parrot Security OS
APA, Harvard, Vancouver, ISO, and other styles
12

Onishchenko, Volodymyr, Oleksandr Puchkov, and Ihor Subach. "Investigation of associative rule search method for detection of cyber incidents in information management systems and security events using CICIDS2018 test data set." Collection "Information Technology and Security" 12, no. 1 (2024): 91–101. http://dx.doi.org/10.20535/2411-1031.2024.12.1.306275.

Full text
Abstract:
Automated rule generation for cyber incident identification in information management and security event systems (SIEM, SYSTEM, etc.) plays a crucial role in modern cyberspace defense, where data volumes are exponentially increasing, and the complexity and speed of cyber-attacks are constantly rising. This article explores approaches and methods for automating the process of cyber incident identification rule generation to reduce the need for manual work and ensure flexibility in adapting to changes in threat models. The research highlights the need for utilizing modern techniques of Intellige
APA, Harvard, Vancouver, ISO, and other styles
13

Miloslavskaya, Natalia. "Designing blockchain-based SIEM 3.0 system." Information & Computer Security 26, no. 4 (2018): 491–512. http://dx.doi.org/10.1108/ics-10-2017-0075.

Full text
Abstract:
Purpose Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated
APA, Harvard, Vancouver, ISO, and other styles
14

Yakoviv, Ihor. "Model of four cyber attack information environments." Collection "Information Technology and Security" 11, no. 2 (2023): 175–92. http://dx.doi.org/10.20535/2411-1031.2023.11.2.293768.

Full text
Abstract:
The basis of the functioning of the modern cyber defense infrastructure of the corporate IT system is the procedure of comparing current events in the computer environment with the security event indicator. If the indicator matches the corresponding event, security information about this event is generated and transmitted to the SIEM for analysis. Based on the results of the analysis, a decision is made about the existence of a cyber security incident. At the next stage, a decision is made and implemented, which restores the state of cyber security. A mandatory condition for the effective cybe
APA, Harvard, Vancouver, ISO, and other styles
15

Sitnik, Viktoria A., Denis D. Vishnyakov, and Maria V. Shcherba. "Organization of monitoring of network intrusions on the basis of freely distributable software." Digital technology security, no. 2 (June 30, 2022): 63–73. http://dx.doi.org/10.17212/2782-2230-2022-2-63-73.

Full text
Abstract:
This paper presents the results of preparing a virtual bench for modeling and detecting network attacks using a freely distributed intrusion detection system (IDS). The relevance of the work is related to the growing demand for IDS as sources of information security events for security information and event management (SIEM) systems. A comparative analysis of the most popular freely distributed open-source network IDSs was carried out and the choice of the Zeek system for its use in the project was substantiated. The work uses Zeek network logs, which contain important and structured informati
APA, Harvard, Vancouver, ISO, and other styles
16

Fournaris, Apostolos P., Charis Dimopoulos, Konstantinos Lampropoulos, and Odysseas Koufopavlou. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (2020): 3092. http://dx.doi.org/10.3390/s20113092.

Full text
Abstract:
Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly events. Such sensors tho
APA, Harvard, Vancouver, ISO, and other styles
17

Yudhianto, Ichsan. "Simple, Fast, and Accurate Cybercrime Detection on E-Government with Elastic Stack SIEM." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 9, no. 2 (2023): 263. http://dx.doi.org/10.26418/jp.v9i2.64213.

Full text
Abstract:
Increased public activity in cyberspace (Internet) during the Covid-19 pandemic has also increased cybercrime cases with various attack targets, including E-Government services. Cybercrime is hidden and occurs unnoticed in E-Government, so handling it is challenging for all government agencies. The characteristics of E-Government are unique and different from other service systems in general, requiring extra anticipation for the prevention and handling of cybercrime attack threats. This research proposes log and event data analysis to detect cybercrime in e-Government using System Information
APA, Harvard, Vancouver, ISO, and other styles
18

Barletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera, and Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security." Algorithms 16, no. 2 (2023): 112. http://dx.doi.org/10.3390/a16020112.

Full text
Abstract:
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) to enhance the detection, response, and prevention of cyber-attacks in the automotive context. The goal is to monitor in real-time each subsystem of
APA, Harvard, Vancouver, ISO, and other styles
19

Uche Ojika, Favour, Wilfred Oseremen Owobu, Olumese Anthony Abieba, Oluwafunmilayo Janet Esan, Bright Chibunna Ubamadu, and Andrew Ifesinachi Daraojimba. "The Role of AI in Cybersecurity: A Cross-Industry Model for Integrating Machine Learning and Data Analysis for Improved Threat Detection." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 1427–48. https://doi.org/10.62225/2583049x.2024.4.6.4045.

Full text
Abstract:
The increasing sophistication and frequency of cyberattacks have necessitated advanced approaches to cybersecurity across all sectors. Artificial Intelligence (AI), particularly through machine learning (ML) and data analysis, is emerging as a transformative force in threat detection and response. This paper presents a cross-industry model for integrating AI-driven systems to enhance cybersecurity resilience and operational efficiency. By leveraging supervised and unsupervised machine learning algorithms, the proposed model enables dynamic anomaly detection, real-time threat identification, an
APA, Harvard, Vancouver, ISO, and other styles
20

Tariq, Aamna, Jawad Manzoor, Muhammad Ammar Aziz, Zain Ul Abideen Tariq, and Ammar Masood. "Open source SIEM solutions for an enterprise." Information & Computer Security, September 27, 2022. http://dx.doi.org/10.1108/ics-09-2021-0146.

Full text
Abstract:
Purpose The security of applications, systems and networks has always been the source of great concern for both enterprises and common users. Different security tools like intrusion detection system/intrusion prevention system and firewalls are available that provide preventive security to the enterprise networks. However, security information and event management (SIEM) systems use these tools in combination to collect events from diverse data sources across the network. SIEM is a proactive tool that processes the events to present a unified security view of the whole network at one location.
APA, Harvard, Vancouver, ISO, and other styles
21

Gürtürk, Uğur, and Zeynep Gürkaş Aydın. "An Incident Management System Design to Protect Critical Infrastructures from Cyber Attacks." Journal of Mathematical Sciences and Modelling, June 4, 2024, 60–74. http://dx.doi.org/10.33187/jmsm.1484997.

Full text
Abstract:
In recent years, there has been a noticeable trend toward targeted threats to information security, where companies are now leveraging vulnerabilities and risks associated with widely used services in order to generate financial gain. Additionally, they implement numerous precautions and consistently carry out their tasks. One item that requires precautionary measures is the network devices utilized. Network devices in computer networks possess the capability to log events. These logs enable the identification of security events on the network and facilitate the implementation of precautionary
APA, Harvard, Vancouver, ISO, and other styles
22

Apostolos, P. Fournaris, Dimopoulos Charis, Lampropoulos Konstantinos, and Koufopavlou Odysseas. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (2020). https://doi.org/10.3390/s20113092.

Full text
Abstract:
Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly
APA, Harvard, Vancouver, ISO, and other styles
23

Schölzel, Markus, Evren Eren, Kai-Oliver Detken, and Leonid Schwenke. "MONITORING ANDROID DEVICES BY USING EVENTS AND METADATA." International Journal of Computing, December 29, 2016, 248–58. http://dx.doi.org/10.47839/ijc.15.4.856.

Full text
Abstract:
Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of the operating system and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored. The concept of port-based authentication using IEEE 802.1X restricts access and may provide statistical data about users entering or leaving a network, but it does not consider the threat devices can pose if they have already been authenticated and used. Security information and event management (SIEM) software ha
APA, Harvard, Vancouver, ISO, and other styles
24

Joy, Francis. "Emerging Trends and Challenges in Cybersecurity: Keeping up with advancements in technology, addressing new threats like ransomware, and developing innovative solutions to enhance cybersecurity capabilities." March 30, 2024. https://doi.org/10.5281/zenodo.10897234.

Full text
Abstract:
The goal of this research is to design and implement a comprehensive system that utilizes network data sources such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to analyze network traffic and detect ransomware communication patterns. By extracting relevant features from network activity data and applying supervised and unsupervised learning algorithms, the system aims to distinguish anomalous network behavior indicative of ransomware presence. The evaluation metrics used include accuracy, precision, recall, F1 score, and AUC-ROC to assess the best-per
APA, Harvard, Vancouver, ISO, and other styles
25

Lipskiy, Nikolay, and James Tyson. "Advancing PH Emergency Preparedness Informatics to Support Emergency Responses." Online Journal of Public Health Informatics 9, no. 1 (2017). http://dx.doi.org/10.5210/ojphi.v9i1.7637.

Full text
Abstract:
ObjectiveThe purpose of this project is to demonstrate progress in developinga scientific and practical approach for public health (PH) emergencypreparedness and response informatics (EPRI) that supports theNational Health Security Strategy and Global Health SecurityAgenda (GHSA) objectives. PH emergency operations centers (EOC)contribute to health security objectives because they operationalizeresponse, recovery and mitigation activities during national andinternational PH events. The primary focus of this presentation is todescribe the results of an analysis of CDC’s EOC, and other EOCs, inb
APA, Harvard, Vancouver, ISO, and other styles
26

Srinivas, Koppu. "A Survey on Recent Trends in Human-Computer Interaction." September 28, 2012. https://doi.org/10.5121/ijbb.2012.2302.

Full text
Abstract:
International Journal on Bioinformatics & Biosciences (IJBB) Vol.2, No.3, September 2012 DOI : 10.5121/ijbb.2012.2302 13 A Survey on Recent Trends in Human-Computer Interaction Srinivas Koppu1 , V. Madhu Viswanatham2 and Kamalakannan J1 1 School of Information Technology and Engineering, VIT University, Vellore, India srinukoppu@gmail.com and jkamalakannan@vit.ac.in 2 School of computing Science and Engineering VIT University, Vellore, India vmadhuviswanatham@vit.ac.in ABSTRACT This paper identifies the different kinds of methods, which helps human to communicate with computer. Traditional
APA, Harvard, Vancouver, ISO, and other styles
27

Stalcup, Meg. "What If? Re-imagined Scenarios and the Re-Virtualisation of History." M/C Journal 18, no. 6 (2016). http://dx.doi.org/10.5204/mcj.1029.

Full text
Abstract:
Image 1: “Oklahoma State Highway Re-imagined.” CC BY-SA 4.0 2015 by author, using Wikimedia image by Ks0stm (CC BY-SA 3 2013). Introduction This article is divided in three major parts. First a scenario, second its context, and third, an analysis. The text draws on ethnographic research on security practices in the United States among police and parts of the intelligence community from 2006 through to the beginning of 2014. Real names are used when the material is drawn from archival sources, while individuals who were interviewed during fieldwork are referred to by their position rank or titl
APA, Harvard, Vancouver, ISO, and other styles
28

De Boisboissel, G. "Արհեստական բանականություն. կիրառման նոր ձևերը և ազդեցությունը զորքերի մարտական կառավարման վրա / Artificial intelligence: new uses and impacts on military command and control". Հայկական բանակ / Armenian Army, 2024, 36–70. https://doi.org/10.61760/18290108-ehb24.2-36.

Full text
Abstract:
General information and background on AI 1.1 The three battlefield revolutions The digitisation of the battlefield is a major revolution in combat, which needs to be assessed on a long-term scale as it will profoundly change military operating methods. First of all, it will mean that all the equipment deployed in the field will be interconnected with a tactical bubble that enables secure data exchanges to reduce the fog of war. What is already true for many armoured vehicles* will be true in the future for the dismounted soldier himself, who will be carrying advanced technologies. Processing t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!