Publication:
SIEM with LSA technique for Threat identification

dc.contributor.authorPavarit Dairinramen_US
dc.contributor.authorDamras Wongsawangen_US
dc.contributor.authorPagaporn Pengsarten_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2018-10-19T04:52:21Z
dc.date.available2018-10-19T04:52:21Z
dc.date.issued2013-01-01en_US
dc.description.abstractSecurity in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with current situation. It helps to manage and identify the threats. Moreover, it will initiate a proper an action to protect the network against the right threats and also generate a report for the administrators. However, the amount of threats is increasing rapidly, and the variation of threats is also another issue for identifying. The Latent Semantic Analysis (LSA) was proposed in this paper to help alleviate these problems. It would improve the performance by reducing the unnecessary noise in a huge data generated from devices. It is also used to detect a similar threat pattern relying on similarity between threats and events/logs. The experiments showed that LSA approach can help eliminating not significant data used in the threat identifying process without degradation of the accuracy. © 2013 IEEE.en_US
dc.identifier.citationIEEE International Conference on Networks, ICON. (2013)en_US
dc.identifier.doi10.1109/ICON.2013.6781951en_US
dc.identifier.issn15566463en_US
dc.identifier.other2-s2.0-84899449149en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/123456789/31654
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84899449149&origin=inwarden_US
dc.subjectComputer Scienceen_US
dc.subjectEngineeringen_US
dc.titleSIEM with LSA technique for Threat identificationen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84899449149&origin=inwarden_US

Files

Collections