Loading...

Transactions on Large-Scale Data- and KnowledgeLNCS 10720 Centered Systems XXXVI

Tahun : 2017
Pengarang : Tran Khanh Dang • Nam Thoai Guest Editors
Penerbit : springer
Ket : <u></u>Due to the increasing complexity and variety of attacks, modern Threat Detection Systems (TDS) are becoming more sophisticated and data-intensive. They leverage the correlation of security events from several log files to detect and prevent cyber attacks [34,45]. This is typically done in two main steps: an automatic pattern or anomaly detection phase which highlights suspicious events followed by a detailed investigation carried out by a human expert who must decide whether the anomalous pattern corresponds to an actual attack. In this second phase, the expert must often inspect the raw data (log files) that triggered the alert.
Ketegori : DATA SECURITY

Download