Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of security incidents are the most important and difficult tasks. It is required to detect security incidents as soon as possible, to analyze and respond to them correctly, so as not to complicate the work of the enterprise computer network. The difficulty is that different event sources offer different data formats or can duplicate events. In addition, some events do not indicate any problems on their own, but their sequence may indicate the presence of a security incident. All collection processes of security events must be performed in real-time, which means streaming data processing.
CITATION STYLE
Chernova, E. V., Polezhaev, P. N., Shukhman, A. E., Ushakov, Y. A., Bolodurina, I. P., & Bakhareva, N. F. (2019). Security event data collection and analysis in large corporate networks. In CEUR Workshop Proceedings (Vol. 2416, pp. 233–241). CEUR-WS. https://doi.org/10.18287/1613-0073-2019-2416-233-241
Mendeley helps you to discover research relevant for your work.