Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs

2014 ◽  
Author(s):  
Beatriz Gallego-Nicasio Crespo ◽  
Alan Garwood
2018 ◽  
Vol 6 (11) ◽  
pp. 649-652
Author(s):  
Nerella Sameera ◽  
M. Shashi

2021 ◽  
Vol 6 (1) ◽  
pp. 72-82
Author(s):  
Faiz Iman Djufri ◽  
Charles Lim

Cyber Security is an interchange between attackers and defenders, a non-static balancing force. The increasing trend of novel security threats and security incidents, which does not seem to be stopping, prompts the need to add another line of security defences. This is because the risk management and risk detection has become virtually impossible due to the limited access towards user data and the variations of modern threat taxonomies. The traditional strategy of self-discovery and signature detection which has a static nature is now obsolete in facing threats of the new generation with a dynamic nature; threats which are resilient, complex, and evasive. Therefore, this thesis discusses the use of MISP and The Triad Investigation approach to share the Indicator of Compromise on Cyber Intelligence Sharing Platform to be able to address the newt threats.


Author(s):  
Cosmena Mahapatra

Recent attacks on Indian Bank customers have exposed the vulnerability of banking networks in India and the ignorance that prevails in the system. Unlike their foreign counterparts Indian banking networks are not aware of solutions easily available in market to counter cyber theft and cyber terrorism. SIEM or Security Information and Event Management is one such solution which could have easily negated these attacks. This chapter focuses on studying various cyber security mechanisms including SIEM for implementation of cyber defense effectively.


Author(s):  
Andrea Chiappetta

Analyzing the evolution of new generation peripherals can affirm that the next decade will be characterized by the exponential increase in the number of “objects” interconnected to the internet that will be more able to communicate with each other independently and will lead to the affirmation of the paradigm internet of things (IoT), which will revolutionize everyday life on a global level. This evolution will concern not only the business realities, interested in the development of applications and systems necessary to emerge and be competitive on the market but also the ordinary citizens who will be surrounded by interconnected objects able to facilitate their everyday life. This aspect implies particular attention to the implementation of solutions oriented to cyber security necessary to guarantee an efficient and effective level of protection against the threats coming from the “world” internet, known by the term cyber space.


Sign in / Sign up

Export Citation Format

Share Document