How do information security workers use host data? A summary of interviews with security analysts

Type: Preprint

Publication Date: 2018-01-01

Citations: 12

DOI: https://doi.org/10.48550/arxiv.1812.02867

Locations

  • arXiv (Cornell University) - View
  • DataCite API - View

Similar Works

Action Title Year Authors
+ How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations 2019 George Grispos
William Bradley Glisson
Tim Storer
+ How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations 2019 George Grispos
William Bradley Glisson
Tim Storer
+ Testing SOAR Tools in Use 2022 Robert A. Bridges
Ashley E. Rice
Sean Oesch
Jeffrey A. Nichols
Cory Watson
Kevin Spakes
Savannah Norem
Mike Huettel
Brian Jewell
Brian Weber
+ PDF Chat A Survey of Intrusion Detection Systems Leveraging Host Data 2019 Robert A. Bridges
Tarrah R. Glass-Vanderlan
Michael D. Iannacone
Maria S. Vincent
Qian Chen
+ PDF Chat How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations 2019 George Grispos
William Bradley Glisson
Tim Storer
+ UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs 2006 William Yurcik
Cristina L. Abad
Ragib Hasan
Moazzam Saleem
Shyama Sridharan
+ A Survey of Intrusion Detection Systems Leveraging Host Data 2018 Tarrah R. Glass-Vanderlan
Michael D. Iannacone
Maria S. Vincent
Qian Qian
Chen
Robert A. Bridges
+ A Survey of Intrusion Detection Systems Leveraging Host Data 2018 Tarrah R. Glass-Vanderlan
Michael D. Iannacone
Maria S. Vincent
Qian Qian
Chen
Robert A. Bridges
+ Aggregate Analysis of Security Surveys 2021 Bindu Dodiya
Umesh Kumar Singh
Vivaan Gupta
+ PDF Chat An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center 2020 Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
John R. Goodall
Kelly M. T. Huffer
Craig Miles
Dan Scofield
+ Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships 2023 Subhadip Kumar
+ An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center 2020 Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
John R. Goodall
Kelly M. T. Huffer
Craig Miles
Dan Scofield
+ An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center 2020 Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
John R. Goodall
Kelly M. T. Huffer
Craig Miles
Dan Scofield
+ A Study of Cyber Security Challenges and its Emerging Trends on Latest Technologies 2023 K Radhika
Gangadhara Sundar
Sarath Kumar
T. N. Srinivasan
+ Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review 2018 Faheem Ullah
Muhammad Ali Babar
+ Forming IDEAS Interactive Data Exploration & Analysis System. 2018 Robert A. Bridges
Maria A. Vincent
Kelly M. T. Huffer
John R. Goodall
Jessie D. Jamieson
Zachary Burch
+ Surveying Vulnerable Populations: A Case Study of Civil Society Organizations 2020 Nikita Samarin
Alisa Frik
Sean Brooks
Coye Cheshire
Serge Egelman
+ Security Incident Recognition and Reporting (SIRR): An Industrial Perspective 2017 George Grispos
William Bradley Glisson
David Bourrie
Tim Storer
Stacy Miller
+ Security Incident Recognition and Reporting (SIRR): An Industrial Perspective 2017 George Grispos
William Bradley Glisson
David Bourrie
Tim Storer
Stacy Miller
+ Sonification in security operations centres: what do security practitioners think? 2018 Louise Axon
Bushra Alahmadi
Jason R. C. Nurse
Michael Goldsmith
Sadie Creese

Works That Cite This (8)

Action Title Year Authors
+ PDF Chat An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center 2020 Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
John R. Goodall
Kelly M. T. Huffer
Craig Miles
Dan Scofield
+ Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach 2019 Michael D. Iannacone
Robert A. Bridges
+ Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection. 2020 Robert A. Bridges
Sean Oesch
Miki E. Verma
Michael D. Iannacone
Kelly M. T. Huffer
Brian Jewell
Jeffrey A. Nichols
Brian Weber
Justin M. Beaver
Jared M. Smith
+ An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center 2020 Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
John R. Goodall
Kelly M. T. Huffer
Craig Miles
Dan Scofield
+ PDF Chat Testing SOAR tools in use 2023 Robert A. Bridges
Ashley E. Rice
Sean Oesch
Jeffrey A. Nichols
Cory Watson
Kevin Spakes
Savannah Norem
Mike Huettel
Brian Jewell
Brian Weber
+ An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center 2020 Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
John R. Goodall
Kelly M. T. Huffer
Craig Miles
Dan Scofield
+ PDF Chat A Survey of Intrusion Detection Systems Leveraging Host Data 2019 Robert A. Bridges
Tarrah R. Glass-Vanderlan
Michael D. Iannacone
Maria S. Vincent
Qian Chen
+ Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection 2019 Qian Chen
Sheikh Rabiul Islam
Henry Haswell
Robert A. Bridges