scholarly journals Cyber Threat Hunting

Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries. Cyber threat hunting, a proactive method of detecting cyber threats without necessarily knowing the rules or pre-defined knowledge of threats, still requires significant manual effort and is largely missing the required machine intelligence to deploy autonomous analysis. This paper proposes a novel and interactive cognitive and predictive threat-hunting prototype tool to minimize manual configuration tasks by using machine intelligence and autonomous analytical capabilities. This tool adds proactive threat-hunting capabilities by extracting unique network communication behaviors from multiple endpoints autonomously while also providing an interactive UI with minimal configuration requirements and various cognitive visualization techniques to help cyber experts quickly spot events of cyber significance from high-dimensional data.

2016 ◽  
Author(s):  
Meonghun Lee ◽  
Haeng-Kon Kim ◽  
Hyun Yeo ◽  
Ha Jin Hwang ◽  
Carlos Ramos ◽  
...  

2019 ◽  
Vol 8 (4) ◽  
pp. 4475-4482

Nowadays, cybersecurity data management has become a challenging issue especially with the emergence of Big Data. This paper introduces the System of Systems (SoS) paradigm to design a new generation SIEM POC (Security Information Event Management Proof Of Concept) made up of an open source Big Data platform ELK and integrated with other open source security and load-balancing tools. To do this, we first focused on the Big Data and Smart Data requirements to model a data lifecycle from the literature named Smart DLC to the System of 7 Systems, So7S. Second, we used the proposed cycle as SoS tools design, implement and test the proposed SIEM POC by matching the cybersecurity tools to each system of the SoS modeled. The proposed open source SIEM is operational and meets all cybersecurity monitoring requirements with challenging results and may interest small and medium-sized companies dealing with cybersecurity issues


Author(s):  
G Ravi Kumar, Et. al.

Security and Privacy protection have been a public approach worry for quite a long time. Notwithstanding, quick innovative changes, the fast development of the internet and electronic business, and the improvement of more modern techniques for gathering, investigating, and utilizing individual information have made privacy a significant public and government issues. The field of data mining is acquiring importance acknowledgment to the accessibility of a lot of data, effortlessly gathered and put away through PC systems. Data mining procedures, while permitting the people to remove shrouded information on one hand, present various privacy dangers then again. In this paper, we concentrate a portion of these issues alongside an itemized conversation on the utilizations of different data mining strategies for giving security. This paper gives an outline of data mining field and security information event management system. We will perceive how different data


Author(s):  
G. Jacobs ◽  
F. Theunissen

In order to understand how the algorithms underlying neural computation are implemented within any neural system, it is necessary to understand details of the anatomy, physiology and global organization of the neurons from which the system is constructed. Information is represented in neural systems by patterns of activity that vary in both their spatial extent and in the time domain. One of the great challenges to microscopists is to devise methods for imaging these patterns of activity and to correlate them with the underlying neuroanatomy and physiology. We have addressed this problem by using a combination of three dimensional reconstruction techniques, quantitative analysis and computer visualization techniques to build a probabilistic atlas of a neural map in an insect sensory system. The principal goal of this study was to derive a quantitative representation of the map, based on a uniform sample of afferents that was of sufficient size to allow statistically meaningful analyses of the relationships between structure and function.


2015 ◽  
Vol 24 (3) ◽  
pp. 74-85
Author(s):  
Sandra M. Grether

Individuals with Rett syndrome (RS) present with a complex profile. They benefit from a multidisciplinary approach for diagnosis, treatment, and follow-up. In our clinic, the Communication Matrix © (Rowland, 1990/1996/2004) is used to collect data about the communication skills and modalities used by those with RS across the lifespan. Preliminary analysis of this data supports the expected changes in communication behaviors as the individual with RS ages and motor deficits have a greater impact.


Sign in / Sign up

Export Citation Format

Share Document