Публікація: Analysis of correlation rules in Security information and event management systems
dc.contributor.author | Sievierinov, О. V. | |
dc.contributor.author | Ovcharenko, M. | |
dc.date.accessioned | 2021-03-22T10:50:59Z | |
dc.date.available | 2021-03-22T10:50:59Z | |
dc.date.issued | 2020 | |
dc.description.abstract | This article discusses the main components of information security systems and information security incident management. The methods of non-signature, as well as signature analysis of rules and decision-making that are used in such systems are considered. The analysis of existing methods of correlation rules. The main types of each method have been identified. | uk_UA |
dc.identifier.citation | Sievierinov O. Analysis of correlation rules in Security information and event management systems / О. Sievierinov, M. Ovcharenko // Fourth International Scientific and Technical Conference «COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES», 22-23.04.2020. – Kharkiv: NURE, 2020. – С. 24–25. | uk_UA |
dc.identifier.uri | http://openarchive.nure.ua/handle/document/15014 | |
dc.language.iso | en | uk_UA |
dc.publisher | ХНУРЕ | uk_UA |
dc.subject | correlation | uk_UA |
dc.subject | information security management | uk_UA |
dc.subject | signature method | uk_UA |
dc.subject | non-signature method | uk_UA |
dc.subject | incident security | uk_UA |
dc.subject | event security | uk_UA |
dc.subject | SIEM | uk_UA |
dc.title | Analysis of correlation rules in Security information and event management systems | uk_UA |
dc.type | Article | uk_UA |
dspace.entity.type | Publication |
Файли
Оригінальний пакет
1 - 1 з 1
Завантаження...
- Назва:
- Sievierinov_Ovcharenko.pdf
- Розмір:
- 546.11 KB
- Формат:
- Adobe Portable Document Format
Ліцензійний пакет
1 - 1 з 1
Немає доступних мініатюр
- Назва:
- license.txt
- Розмір:
- 9.42 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: