2019
DOI: 10.1016/j.jisa.2019.102375
|View full text |Cite
|
Sign up to set email alerts
|

Discovering and utilising expert knowledge from security event logs

Abstract: Vulnerability assessment and security configuration of computer systems is heavily dependent on human experts, which are widely attributed as being in short supply. This can result in a system being left insecure because of the lack of easily accessible experience and specialist resources. While performing security tasks, human experts often revert to a system's event logs to establish security information (configuration changes, errors, etc.). However, finding and exploiting knowledge from event logs is a cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 78 publications
0
5
0
1
Order By: Relevance
“…Therefore, there is a need for a system that can be easily used by experts who have little security knowledge. Khan and Parkinson extracted domain action models from event logs using rule mining, and by this, non-experts could perform expert analysis [55].…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, there is a need for a system that can be easily used by experts who have little security knowledge. Khan and Parkinson extracted domain action models from event logs using rule mining, and by this, non-experts could perform expert analysis [55].…”
Section: Discussionmentioning
confidence: 99%
“…The penetration test is often performed using a failure-based approach, with test cases designed to investigate known flaws found in popular security vulnerability repositories. Another penetration test approach is experience-based, in which a security expert plays the role of a malicious user attempting to access the system [17,18]. It is a systematic process consisting of six steps, as mentioned in Figure 1.…”
Section: Penetration Testingmentioning
confidence: 99%
“…On the other hand, penetration test is normally performed using a failure-based approach, with test cases designed to investigate known flaws found in popular security vulnerability repositories. Another penetration test approach is experience based, in which a security expert plays the role of a malicious user attempting to access the system [111], [112]. As evidenced in Figure 1, this is a systematic process consisting of six steps.…”
Section: Figure 2 Threat Modeling Process [61]mentioning
confidence: 99%