A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT

2Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The present study aims to automate the manual process of disseminating information from an Academic Computer Security Incident Response Team (A-CSIRT) with the purpose to identify cybersecurity threats and cyber-attacks in real time. In order to realize such attempt, we have applied a quantitative and qualitative evaluation of two traffic analysis tools, which have been used by the A-CSIRT, namely the IDS Snort and the Passive Vulnerability Scanner (PVS). This has been completed in order to determine the content of its log registers and their functionalities. Furthermore, we applied progressively the Ralph Kimball Methodology, beginning with the ETL processes for data collection and filtration, and then using the OLAP processes to construct the BI system. Finally, we implemented a Web application using the Scrum methodology, which allowed to link the obtained logs to the BI system for visualization in dynamic dashboards. This permitted to generate early alerts and to construct complex queries using the user interface through objects structures. The results demonstrate, that this solution involves acquiring data and information from a wide variety of sources, which use enables them within a decision-making process.

Cite

CITATION STYLE

APA

Reyes, F., Fuertes, W., Tapia, F., Toulkeridis, T., Aules, H., & Pérez, E. (2019). A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT. In Advances in Intelligent Systems and Computing (Vol. 857, pp. 1135–1153). Springer Verlag. https://doi.org/10.1007/978-3-030-01177-2_82

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free