SIEM with LSA technique for Threat identification

Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the mos...

Full description

Saved in:
Bibliographic Details
Published inProceedings - IEEE International Conference on Networks pp. 1 - 6
Main Authors Dairinram, Pavarit, Wongsawang, Damras, Pengsart, Pagaporn
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2013
Subjects
Online AccessGet full text
ISSN1531-2216
DOI10.1109/ICON.2013.6781951

Cover

Abstract Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy.
AbstractList Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy.
Author Wongsawang, Damras
Pengsart, Pagaporn
Dairinram, Pavarit
Author_xml – sequence: 1
  givenname: Pavarit
  surname: Dairinram
  fullname: Dairinram, Pavarit
  email: g5237679@student.mahidol.ac.th
  organization: Fac. of Inf. & Commun. Technol., Mahidol Univ., Bangkok, Thailand
– sequence: 2
  givenname: Damras
  surname: Wongsawang
  fullname: Wongsawang, Damras
  email: damras.won@mahidol.ac.th
  organization: Fac. of Inf. & Commun. Technol., Mahidol Univ., Bangkok, Thailand
– sequence: 3
  givenname: Pagaporn
  surname: Pengsart
  fullname: Pengsart, Pagaporn
  email: pagaporn.pen@mahidol.ac.th
  organization: Fac. of Inf. & Commun. Technol., Mahidol Univ., Bangkok, Thailand
BookMark eNotj8tKw0AUQEeoYFv7AeJmfiDx3nnPsoSqgWgXreuSzIOMaKLJiPj3CnZ1zurAWZHFMA6BkBuEEhHsXV3tn0sGyEulDVqJF2Rj_0xoaxkYoRZkiZJjwRiqK7Ka51cABkyLJcFDvXui3yn3tDlsaQ6uH9LnV6BxnOixn0KbafJhyCkm1-Y0DtfkMrZvc9icuSYv97tj9Vg0-4e62jZFQi1zITvvubI2RgYenUFpZOyEwa7l2qMG1THtpVdRQjTApXNC8SDAiYCh03xNbv-7KYRw-pjSezv9nM6H_Bcp0ETy
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICON.2013.6781951
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
Accès UTTOP - IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781479920846
1479920843
9781479920839
1479920835
EndPage 6
ExternalDocumentID 6781951
Genre orig-research
GroupedDBID 29N
29O
6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i175t-5bdd3699ff20d1c81585fb481ba37d1706b27d5d6f50f8035cc463e40c4e1eb73
IEDL.DBID RIE
ISSN 1531-2216
IngestDate Wed Aug 27 04:25:46 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-5bdd3699ff20d1c81585fb481ba37d1706b27d5d6f50f8035cc463e40c4e1eb73
PageCount 6
ParticipantIDs ieee_primary_6781951
PublicationCentury 2000
PublicationDate 2013-Dec.
PublicationDateYYYYMMDD 2013-12-01
PublicationDate_xml – month: 12
  year: 2013
  text: 2013-Dec.
PublicationDecade 2010
PublicationTitle Proceedings - IEEE International Conference on Networks
PublicationTitleAbbrev ICON
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020274
Score 1.8932577
Snippet Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Artificial intelligence
Equations
IP networks
Latent Semantic Ankysis
Mathematical model
Network Security
Security
Security Information and Event Management
Semantics
Threat identification
Vectors
Title SIEM with LSA technique for Threat identification
URI https://ieeexplore.ieee.org/document/6781951
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61J734aMU3OXg02002z6OUSiu2Cm2ht5LsZLEIrcj24q93s7uuDzx4CSGHMGFCZib5vi8IXWsjnE4sI15zRriILdGhiYFnFpQWWUkfG0_kcM7vF2LRQjcNF8Z7X4LPfBS65Vs-bNJtuCrrFQcrNYEvvVNss4qr1RRXobyqtFEpYYzK-gWTxqY36j9OAogrieoJfvykUgaSu300_jShwo-8RNvcRen7L3XG_9p4gLpflD381ASjQ9Ty6yO0901tsIPodDQY43Dxih-mt7hRb8VF3opnzyF7xCuo0UOlw7pofjeY9Yek_jGBrIo0ICfCASTSmCxjMdBU06IYyBwvUlObKAhKOY4pECAzEWc6TkSacpl4HqfcU-9Ucoza683anyDMgIKUBoQFw0EKayyXQikDygtj6SnqhMUvXytRjGW97rO_h8_RbnBAhQO5QO38besvi2ieu6vSjR9l_pwB
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH-MeVAvfmzitzl4tF3TJmlzlLGx6TqFbbDbSPtSHINNpLv415u0tX7gwUsIOYQXHuR95Pf7BeA2kjyJAuU7OmK-w7innMgOHrJMYRjxrKCPxWMxmLGHOZ834K7mwmitC_CZdu20eMvHTbq1rbKOuViptHzpHRP3GS_ZWnV5ZQusUh2VOr5PRfWGST3ZGXafxhbGFbjVFj_-UilCSf8A4k8jSgTJyt3miZu-_9Jn_K-Vh9D-Iu2R5zocHUFDr49h_5veYAvoZNiLiW29ktHkntT6rcRkrmT6YvNHssQKP1S4rA2zfm_aHTjVnwnO0iQCucMTxEBImWW-hzSNqCkHsoSZ5FQFIVqtnMQPkaPIuJdFXsDTlIlAMy9lmuokDE6gud6s9SkQHykKIZErlAwFV1IxwcNQYqi5VPQMWvbwi9dSFmNRnfv87-Ub2B1M49FiNBw_XsCedUaJCrmEZv621VcmtufJdeHSD8een04
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+IEEE+International+Conference+on+Networks&rft.atitle=SIEM+with+LSA+technique+for+Threat+identification&rft.au=Dairinram%2C+Pavarit&rft.au=Wongsawang%2C+Damras&rft.au=Pengsart%2C+Pagaporn&rft.date=2013-12-01&rft.pub=IEEE&rft.issn=1531-2216&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICON.2013.6781951&rft.externalDocID=6781951
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1531-2216&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1531-2216&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1531-2216&client=summon