M. Vermeer
4 records found
1
From the Outside In
Predicting internal security incidents with external network data
It goes without saying that the Internet is far from secure. As the number of Internet-connected devices increases, so do the number of cyberattacks we have to deal with. Numerous industry reports reveal significant upswings in software vulnerabilities year after year. These are
...
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
Signature-based network intrusion detection systems (NIDSs) and network intrusion prevention systems (NIPSs) remain at the heart of network defense, along with the rules that enable them to detect threats. These rules allow Security Operation Centers (SOCs) to properly defend a n
...
Ruling the Rules
Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environment
...
SoK: A framework for asset discovery
Systematizing advances in network measurements for protecting organizations
Asset discovery is fundamental to any organization's cybersecurity efforts. Indeed, one must accurately know which assets belong to an IT infrastructure before the infrastructure can be secured. While practitioners typically rely on a relatively small set of well-known techniques
...