Identificador persistente para citar o vincular este elemento:
http://hdl.handle.net/10662/20390
Registro completo de Metadatos
Campo DC | Valor | idioma |
---|---|---|
dc.contributor.author | Sancho Núñez, José Carlos | - |
dc.contributor.author | Caro Lindo, Andrés | - |
dc.contributor.author | Ávila Vegas, María del Mar | - |
dc.contributor.author | Bravo Gómez, Alberto | - |
dc.date.accessioned | 2024-02-08T08:53:28Z | - |
dc.date.available | 2024-02-08T08:53:28Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | http://hdl.handle.net/10662/20390 | - |
dc.description.abstract | Security Information and Event Management (SIEM) systems are essential for identifying cyber attacks, being an extended practice in organizations to detect threats, vulnerabilities and to estimate security risks. The management of events and information related to security is done through systems that provide all the information, processing different data sources. The developing of alternative models that provide complementary information to commercial solutions, based on the same data sources, is presented as a novel and interesting challenge, not only for organizations, but also for the scientific community. This paper presents a new system to classify security threats, computing their criticality according to the Bug Bar technique, with the aim of addressing threats in order of priority. High correlations were achieved between severity risk values achieved from commercial systems and results computed by the new approach. Accordingly, the new proposal could complement the information of SIEM systems, and help in the prediction of criticalities of future threats. | es_ES |
dc.format.mimetype | application/pdf | en_US |
dc.language.iso | eng | es_ES |
dc.publisher | Elsevier | es_ES |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | SIEM | es_ES |
dc.subject | SIEM | es_ES |
dc.subject | Ciberseguridad | es_ES |
dc.subject | Cybersecurity | es_ES |
dc.subject | STRIDE | es_ES |
dc.subject | STRIDE | es_ES |
dc.subject | Extracción de conocimiento | es_ES |
dc.subject | Knowledge extraction | es_ES |
dc.subject | Bug bar | es_ES |
dc.subject | Bug bar | es_ES |
dc.subject | Tratamiento de datos | es_ES |
dc.subject | Data processing | es_ES |
dc.title | New approach for threat classification and security risk estimations based on security event management | es_ES |
dc.type | article | es_ES |
dc.description.version | peerReviewed | es_ES |
europeana.type | TEXT | en_US |
dc.rights.accessRights | closedAccess | es_ES |
europeana.dataProvider | Universidad de Extremadura. España | es_ES |
dc.type.version | publishedVersion | es_ES |
dc.contributor.affiliation | Universidad de Extremadura. Departamento de Ingeniería de Sistemas Informáticos y Telemáticos | es_ES |
dc.relation.publisherversion | https://doi.org/10.1016/j.future.2020.07.015 | es_ES |
dc.identifier.publicationtitle | Future Generation Computer Systems | es_ES |
dc.identifier.publicationfirstpage | 488 | es_ES |
dc.identifier.publicationlastpage | 505 | es_ES |
dc.identifier.publicationvolume | 113 | es_ES |
dc.identifier.orcid | 0000-0002-4584-6945 | es_ES |
dc.identifier.orcid | 0000-0002-6367-2694 | es_ES |
dc.identifier.orcid | 0000-0002-8717-442X | es_ES |
Colección: | DISIT - Artículos |
Archivos
Archivo | Descripción | Tamaño | Formato | |
---|---|---|---|---|
1-s2.0-S0167739X20301849-main.pdf ???org.dspace.app.webui.jsptag.ItemTag.accessRestricted??? | 1,66 MB | Adobe PDF | Descargar Pide una copia |
Este elemento está sujeto a una licencia Licencia Creative Commons