Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/12377
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Morufu, Olalere | - |
dc.contributor.author | Juliana, Ndunagu | - |
dc.contributor.author | Abdulhamid, Shafi’i Muhammad | - |
dc.contributor.author | Odey, Peter | - |
dc.date.accessioned | 2021-08-04T09:12:22Z | - |
dc.date.available | 2021-08-04T09:12:22Z | - |
dc.date.issued | 2019-08-13 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/12377 | - |
dc.description.abstract | With rising trends and forms of web application attacks such as SQL Injection, cross-site scripting and the likes, most organizations today deploy a security information and event management solution as a proactive measure for threat management to get a centralized view of the network security posture and for advanced reporting of incidents. The days of relying merely on perimeter controls are elapsed; it is no longer enough to just rely on firewalls, Intrusion Detection Systems, Intrusion Protection systems and antivirus alone. Security information and event management systems have become a crucial and essential component of complex enterprise networks. They typically aggregate and correlate incidents from different systems and platforms, and carry out a rule-based analysis to detect advanced threats. This paper detects, evaluates and analyzes the performance of various SIEM detecting web based attacks, noting the time of report of attack and behavioral patterns of each SIEM. An attack simulation experiment is performed on different SIEM tools to demonstrate the capabilities of SIEM in detecting any suspicious behavior of event logs and alerting the attacks in near real-time, then the best tool is recommended based on its ability to collect, filter, normalize, correlate, alert, and report attacks within minutes after attack incidents. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Proceedings of the Cyber Secure Nigeria 2019 Conference, CBN International Training Institute, Maitama, Abuja, Nigeria | en_US |
dc.subject | Cyber crimes | en_US |
dc.subject | Security | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Cloud Computing security | en_US |
dc.title | Performance Analysis of Security Information and Event Management Solutions Detecting Web-Based Attacks | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
71&72.pdf | Performance Analysis of Security Information and Event Management Solutions Detecting Web-Based Attacks | 5.91 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.