2020
DOI: 10.1007/978-981-15-7062-9_53
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of Attacks on Active Directory Using SIEM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 4 publications
0
5
0
1
Order By: Relevance
“…For example, AI/ML algorithms can recognize unexpected changes in connectivity patterns or user activities, identifying potential threats. In addition, continuous training of ML models can identify patterns that were previously not identified as threatening [44].…”
Section: Active Directory (Ad) -Open Xdrmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, AI/ML algorithms can recognize unexpected changes in connectivity patterns or user activities, identifying potential threats. In addition, continuous training of ML models can identify patterns that were previously not identified as threatening [44].…”
Section: Active Directory (Ad) -Open Xdrmentioning
confidence: 99%
“…Complexity in extracting actionable information from vast datasets [43], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42] AD and Open XDR Collaboration Combined analysis of AD data and Open XDR for nuanced threat detection Integrated approach to threat detection and response; Increased security N/A [48], [44], [45], [46], [47] Applications and Open XDR AI/ML for log file analysis; Pattern recognition and anomaly detection Accurate identification of risks; Real-time data analysis for rapid response Challenges in processing large volumes of complex data [5], [6], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57] Log Forwarding and Open XDR Centralized log data analysis; Crossreferencing data from different sources Comprehensive view of digital activities; Advanced security analysis Management of extensive log data; Need for advanced analytical technologies [5], [6], [33], [38], [58], [59], [60], [61], [62], [63], [64], [65], …”
Section: Enhanced Detection Of Coordinated Cyber-threats; Realtime Th...mentioning
confidence: 99%
“…AD, as a basic identity management system in many enterprises, provides information about the identity of users, their roles, and permissions. By leveraging data from AD, Open XDR is enhanced with different sources of information, including connectivity logs and user actions [43].…”
Section: Active Directory (Ad) -Open Xdrmentioning
confidence: 99%
“…Therefore, Open XDR, in addition to being a simple detection and response tool, is transformed into an advanced proactive security system that integrates various levels of analysis and information, constituting a broader ecosystem for dealing with cyber threats. The true value of the Open XDR platform is revealed through its multidimensional ability to coordinate and correlate data from a variety of sources, such as Intrusion Detection (IDS), Network Endpoint Incident Response (EDR) and Security Information and Incident Management (SIEM) systems, while considering geographic information and threat intelligence data [18,24,28,43]. This holistic approach not only maximizes the potential for more accurate threat detection but is also a catalyst for improving and personalizing response strategies.…”
Section: The Catalytic Role Of Open Xdrmentioning
confidence: 99%
“…Many of the papers are outdated and cover older attack methods targeting operating systems from that era, while more recent papers discuss newer attack methods and the birth of new authentication protocols that lead to new attack methods. Muthuraj et al [3] discussed the detection and prevention of password authentication attacks on Active Directory using SIEM (security information and event management). Windows operating systems use different authentication mechanisms such as Kerberos, Public Key certificates, Digest, NT LAN Manager (NTLM), and different attack methods such as kerberoasting, brute force, credential dumping, and credential theft can be used to attack the relevant authentication mechanisms.…”
Section: Literature Reviewmentioning
confidence: 99%