Show simple item record

dc.contributor.authorShelke, Palvi
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorLehto, Martti
dc.contributor.editorKarjalainen, Mika
dc.date.accessioned2024-06-27T12:13:36Z
dc.date.available2024-06-27T12:13:36Z
dc.date.issued2024
dc.identifier.citationShelke, P., & Hämäläinen, T. (2024). Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 780-787). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2123" target="_blank">https://doi.org/10.34190/eccws.23.1.2123</a>
dc.identifier.otherCONVID_220869809
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/96198
dc.description.abstractThe escalating risk of cyber threats requires continuous advances in security monitoring techniques. This survey paper provides a comprehensive overview of recent research into novel methods for cyber threat detection, encompassing diverse approaches such as machine learning, artificial intelligence, behavioral analysis and anomaly detection. Machine learning plays a central role in cyber threat detection, highlighting the effectiveness of deep neural networks in identifying evolving threats. Their adaptability to changing attack patterns is emphasized, underlining their importance for real-time security monitoring. In parallel, ensemble learning is explored, combining multiple models to improve overall detection accuracy and create a robust defense against a spectrum of cyber threats. The literature reviewed highlights the importance of behavioral analysis, with a novel approach that integrates user behaviour profiling with anomaly detection. This has proven effective in identifying suspicious activity within a network, particularly insider threats and stealthy attacks. Another behavioral framework using User and Entity Behavior Analytics (UEBA) is presented for enhanced anomaly detection, highlighting the importance of context-aware monitoring in improving threat detection accuracy. Collaborative defense mechanisms emerge as a major focus of the research papers reviewed, exploring the potential of sharing threat information between organisations to enhance collective security monitoring. Their findings underscore the importance of a collaborative approach to staying ahead of rapidly evolving cyber threats. Some types of cyber-attacks are also analysed in the context of a security operations centre (SOC) monitoring environment using a security information and event management (SIEM) tool - Splunk. In conclusion, this survey paper synthesizes recent advances in cyber threat detection methods in security monitoring that integrate machine learning, behavioral analysis, and collaborative defense strategies. As cyber threats continue to evolve, these novel methods provide valuable insights for researchers, practitioners, and organisations seeking to strengthen their cybersecurity defenses. This concise overview emphasises the multi-dimensional approach required to secure digital ecosystems, providing a concise yet comprehensive guide to modern cyber threat detection strategies.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofProceedings of the 23rd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.otherSIEM and splunk monitoring
dc.subject.othersecurity monitoring
dc.subject.othermachine learning
dc.subject.otherbehavioral analysis
dc.subject.otheranomaly detection
dc.subject.otherthreat intelligence
dc.titleAnalysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202406275040
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange780-787
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume23
dc.type.versionpublishedVersion
dc.rights.copyright© 2024 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoturvallisuus
dc.subject.ysokyberturvallisuus
dc.subject.ysotietoturva
dc.subject.ysokoneoppiminen
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p7349
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.23.1.2123
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0