2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) 2022
DOI: 10.1109/isriti56927.2022.10052950
|View full text |Cite
|
Sign up to set email alerts
|

The Analysis of Attacks Against Port 80 Webserver with SIEM Wazuh Using Detection and OSCAR Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…These systems include Wazuh, which functions as a Security Information and Event Management (SIEM) system, as well as an XDR and EDR system capable of detecting any threat. Alongside Wazuh, there are TheHive, Cortex, n 8 n, Cuckoo Sandbox, and MISP [ 35 ], all fulfilling the functionalities of a Security Incident Response Platform (SIRP). FleetDM with OsQuery serves as the threat-hunting and identification module.…”
Section: Design and Implementation Of The Security Framework For Assu...mentioning
confidence: 99%
“…These systems include Wazuh, which functions as a Security Information and Event Management (SIEM) system, as well as an XDR and EDR system capable of detecting any threat. Alongside Wazuh, there are TheHive, Cortex, n 8 n, Cuckoo Sandbox, and MISP [ 35 ], all fulfilling the functionalities of a Security Incident Response Platform (SIRP). FleetDM with OsQuery serves as the threat-hunting and identification module.…”
Section: Design and Implementation Of The Security Framework For Assu...mentioning
confidence: 99%