2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) 2015
DOI: 10.1109/inm.2015.7140300
|View full text |Cite
|
Sign up to set email alerts
|

How to exchange security events? Overview and evaluation of formats and protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
3

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(30 citation statements)
references
References 27 publications
0
27
0
3
Order By: Relevance
“…Realworld information exchange platforms focus rather on highlevel pieces of information such as security alerts, formal representations of security events reported by intrusion detection systems. An overview of formats and protocols for exchange of such information was presented by Steinberger et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…Realworld information exchange platforms focus rather on highlevel pieces of information such as security alerts, formal representations of security events reported by intrusion detection systems. An overview of formats and protocols for exchange of such information was presented by Steinberger et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…Cybersecurity information sharing and risk interdependency have been studied extensively in [12][13][14][15][16][17][18][19][20]. Rutkowski et al [12] have investigated the specification and use case of the cybersecurity information exchange framework.…”
Section: Cybersecurity Information Sharingmentioning
confidence: 99%
“…Collaborative security and collaborative intrusion detection were surveyed recently by Meng et al [15] and Vasilomanolakis et al [21]. Formats and protocols for exchanging security events were brie y surveyed by Steinberger et al [18].…”
Section: Technical Backgroundmentioning
confidence: 99%
“…Lately, STIX gained attention in the cyber security community. There are a lot of examples of security alerts in these formats, as well as their comparison, in the related literature [10,18].…”
Section: Technical Backgroundmentioning
confidence: 99%