SIEM with LSA technique for Threat identification
Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the mos...
Saved in:
Published in | Proceedings - IEEE International Conference on Networks pp. 1 - 6 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2013
|
Subjects | |
Online Access | Get full text |
ISSN | 1531-2216 |
DOI | 10.1109/ICON.2013.6781951 |
Cover
Abstract | Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy. |
---|---|
AbstractList | Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy. |
Author | Wongsawang, Damras Pengsart, Pagaporn Dairinram, Pavarit |
Author_xml | – sequence: 1 givenname: Pavarit surname: Dairinram fullname: Dairinram, Pavarit email: g5237679@student.mahidol.ac.th organization: Fac. of Inf. & Commun. Technol., Mahidol Univ., Bangkok, Thailand – sequence: 2 givenname: Damras surname: Wongsawang fullname: Wongsawang, Damras email: damras.won@mahidol.ac.th organization: Fac. of Inf. & Commun. Technol., Mahidol Univ., Bangkok, Thailand – sequence: 3 givenname: Pagaporn surname: Pengsart fullname: Pengsart, Pagaporn email: pagaporn.pen@mahidol.ac.th organization: Fac. of Inf. & Commun. Technol., Mahidol Univ., Bangkok, Thailand |
BookMark | eNotj8tKw0AUQEeoYFv7AeJmfiDx3nnPsoSqgWgXreuSzIOMaKLJiPj3CnZ1zurAWZHFMA6BkBuEEhHsXV3tn0sGyEulDVqJF2Rj_0xoaxkYoRZkiZJjwRiqK7Ka51cABkyLJcFDvXui3yn3tDlsaQ6uH9LnV6BxnOixn0KbafJhyCkm1-Y0DtfkMrZvc9icuSYv97tj9Vg0-4e62jZFQi1zITvvubI2RgYenUFpZOyEwa7l2qMG1THtpVdRQjTApXNC8SDAiYCh03xNbv-7KYRw-pjSezv9nM6H_Bcp0ETy |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICON.2013.6781951 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings Accès UTTOP - IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9781479920846 1479920843 9781479920839 1479920835 |
EndPage | 6 |
ExternalDocumentID | 6781951 |
Genre | orig-research |
GroupedDBID | 29N 29O 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i175t-5bdd3699ff20d1c81585fb481ba37d1706b27d5d6f50f8035cc463e40c4e1eb73 |
IEDL.DBID | RIE |
ISSN | 1531-2216 |
IngestDate | Wed Aug 27 04:25:46 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-5bdd3699ff20d1c81585fb481ba37d1706b27d5d6f50f8035cc463e40c4e1eb73 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6781951 |
PublicationCentury | 2000 |
PublicationDate | 2013-Dec. |
PublicationDateYYYYMMDD | 2013-12-01 |
PublicationDate_xml | – month: 12 year: 2013 text: 2013-Dec. |
PublicationDecade | 2010 |
PublicationTitle | Proceedings - IEEE International Conference on Networks |
PublicationTitleAbbrev | ICON |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020274 |
Score | 1.8932577 |
Snippet | Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Artificial intelligence Equations IP networks Latent Semantic Ankysis Mathematical model Network Security Security Security Information and Event Management Semantics Threat identification Vectors |
Title | SIEM with LSA technique for Threat identification |
URI | https://ieeexplore.ieee.org/document/6781951 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61J734aMU3OXg02002z6OUSiu2Cm2ht5LsZLEIrcj24q93s7uuDzx4CSGHMGFCZib5vi8IXWsjnE4sI15zRriILdGhiYFnFpQWWUkfG0_kcM7vF2LRQjcNF8Z7X4LPfBS65Vs-bNJtuCrrFQcrNYEvvVNss4qr1RRXobyqtFEpYYzK-gWTxqY36j9OAogrieoJfvykUgaSu300_jShwo-8RNvcRen7L3XG_9p4gLpflD381ASjQ9Ty6yO0901tsIPodDQY43Dxih-mt7hRb8VF3opnzyF7xCuo0UOlw7pofjeY9Yek_jGBrIo0ICfCASTSmCxjMdBU06IYyBwvUlObKAhKOY4pECAzEWc6TkSacpl4HqfcU-9Ucoza683anyDMgIKUBoQFw0EKayyXQikDygtj6SnqhMUvXytRjGW97rO_h8_RbnBAhQO5QO38besvi2ieu6vSjR9l_pwB |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH-MeVAvfmzitzl4tF3TJmlzlLGx6TqFbbDbSPtSHINNpLv415u0tX7gwUsIOYQXHuR95Pf7BeA2kjyJAuU7OmK-w7innMgOHrJMYRjxrKCPxWMxmLGHOZ834K7mwmitC_CZdu20eMvHTbq1rbKOuViptHzpHRP3GS_ZWnV5ZQusUh2VOr5PRfWGST3ZGXafxhbGFbjVFj_-UilCSf8A4k8jSgTJyt3miZu-_9Jn_K-Vh9D-Iu2R5zocHUFDr49h_5veYAvoZNiLiW29ktHkntT6rcRkrmT6YvNHssQKP1S4rA2zfm_aHTjVnwnO0iQCucMTxEBImWW-hzSNqCkHsoSZ5FQFIVqtnMQPkaPIuJdFXsDTlIlAMy9lmuokDE6gud6s9SkQHykKIZErlAwFV1IxwcNQYqi5VPQMWvbwi9dSFmNRnfv87-Ub2B1M49FiNBw_XsCedUaJCrmEZv621VcmtufJdeHSD8een04 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+IEEE+International+Conference+on+Networks&rft.atitle=SIEM+with+LSA+technique+for+Threat+identification&rft.au=Dairinram%2C+Pavarit&rft.au=Wongsawang%2C+Damras&rft.au=Pengsart%2C+Pagaporn&rft.date=2013-12-01&rft.pub=IEEE&rft.issn=1531-2216&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICON.2013.6781951&rft.externalDocID=6781951 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1531-2216&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1531-2216&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1531-2216&client=summon |