Transactions on Large-Scale Data- and KnowledgeLNCS 10720 Centered Systems XXXVI
Tahun : 2017 Pengarang : Tran Khanh Dang • Nam Thoai Guest Editors Penerbit : springer Ket : <u></u>Due to the increasing complexity and variety of attacks, modern Threat Detection Systems (TDS) are becoming more sophisticated and data-intensive. They
leverage the correlation of security events from several log files to detect and
prevent cyber attacks [34,45]. This is typically done in two main steps: an automatic pattern or anomaly detection phase which highlights suspicious events
followed by a detailed investigation carried out by a human expert who must
decide whether the anomalous pattern corresponds to an actual attack. In this
second phase, the expert must often inspect the raw data (log files) that triggered
the alert. Ketegori : DATA SECURITY