Graph-analytical method for analysing information security events
Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above methods in identifying information secu...
Main Authors: | S.L. Zefirov, A.N. Akkuratnov |
---|---|
Format: | Article |
Language: | English |
Published: |
Penza State University Publishing House
2024-03-01
|
Series: | Известия высших учебных заведений. Поволжский регион:Технические науки |
Subjects: |
Similar Items
-
Adaptive Monitoring of Companies' Information Security
by: Valerii Lakhno, et al.
Published: (2023-03-01) -
The Information Security Event Management Systems
by: V. V. Filatov
Published: (2010-03-01) -
PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY
by: V.A. Selifanov, et al.
Published: (2022-01-01) -
Adaptive Security Event Visualization for Continuous Monitoring
by: Anatoly Valerievich Elizarov, et al.
Published: (2014-09-01) -
Information Security Incident Management Practical Aspects
by: A. B. Kostina
Published: (2010-03-01)