dc.contributor.author | Shelke, Palvi | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-06-27T12:13:36Z | |
dc.date.available | 2024-06-27T12:13:36Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Shelke, P., & Hämäläinen, T. (2024). Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 780-787). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2123" target="_blank">https://doi.org/10.34190/eccws.23.1.2123</a> | |
dc.identifier.other | CONVID_220869809 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/96198 | |
dc.description.abstract | The escalating risk of cyber threats requires continuous advances in security monitoring techniques. This survey paper provides a comprehensive overview of recent research into novel methods for cyber threat detection, encompassing diverse approaches such as machine learning, artificial intelligence, behavioral analysis and anomaly detection. Machine learning plays a central role in cyber threat detection, highlighting the effectiveness of deep neural networks in identifying evolving threats. Their adaptability to changing attack patterns is emphasized, underlining their importance for real-time security monitoring. In parallel, ensemble learning is explored, combining multiple models to improve overall detection accuracy and create a robust defense against a spectrum of cyber threats. The literature reviewed highlights the importance of behavioral analysis, with a novel approach that integrates user behaviour profiling with anomaly detection. This has proven effective in identifying suspicious activity within a network, particularly insider threats and stealthy attacks. Another behavioral framework using User and Entity Behavior Analytics (UEBA) is presented for enhanced anomaly detection, highlighting the importance of context-aware monitoring in improving threat detection accuracy. Collaborative defense mechanisms emerge as a major focus of the research papers reviewed, exploring the potential of sharing threat information between organisations to enhance collective security monitoring. Their findings underscore the importance of a collaborative approach to staying ahead of rapidly evolving cyber threats. Some types of cyber-attacks are also analysed in the context of a security operations centre (SOC) monitoring environment using a security information and event management (SIEM) tool - Splunk. In conclusion, this survey paper synthesizes recent advances in cyber threat detection methods in security monitoring that integrate machine learning, behavioral analysis, and collaborative defense strategies. As cyber threats continue to evolve, these novel methods provide valuable insights for researchers, practitioners, and organisations seeking to strengthen their cybersecurity defenses. This concise overview emphasises the multi-dimensional approach required to secure digital ecosystems, providing a concise yet comprehensive guide to modern cyber threat detection strategies. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | Proceedings of the 23rd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | SIEM and splunk monitoring | |
dc.subject.other | security monitoring | |
dc.subject.other | machine learning | |
dc.subject.other | behavioral analysis | |
dc.subject.other | anomaly detection | |
dc.subject.other | threat intelligence | |
dc.title | Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202406275040 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 780-787 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 23 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tietoturva | |
dc.subject.yso | koneoppiminen | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7349 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.23.1.2123 | |
dc.type.okm | A4 | |