Let′s spy on malicious hackers!
#4n6strider

Let′s spy on malicious hackers!

Lets spy on malicious hackers! On my website: https://4n6strider.it I reveal the hypothetical structure of a SIEM, Security Information and Events Management tool.

For this study, I have constructed real – life dataset. Structure is based on my experience, but does not reflect any real deployment.

Its complexity depicts middle size global company. Data in this mock-up are constructed as it was collected in all continents and processed in the middle Europe.

Article has two parts. First is dedicated to using of SIEM. Second part s oriented more to maintenance of SIEM itself.

Miroslav M?ourek

If you want to change the world ... start off by making your bed.

8 年

Interesting ... good work!

Michal Meravy

Incident Response and Digital Forensics Expert

8 年

Very nice article, thank you for sharing!

要查看或添加评论,请登录

Jindrich Karasek的更多文章

  • Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    {Consider this text as my public research notes, that I am building on while doing presentations, case studies, spot…

    2 条评论
  • A phishing story

    A phishing story

    Phishing threat is still valid and it remains the most prevalent way how the attacker get into the enterprise…

  • Election manipulation

    Election manipulation

    Introductory picture {Picture 0} below shows grouped website scan of Government of the Country. Various websites…

    1 条评论
  • RansomWare data mining

    RansomWare data mining

    Recently, I did small research regarding how many different ransomware is found in the wild. Point was to check, if…

  • Penetration test of Mobile devices WiFi

    Penetration test of Mobile devices WiFi

    Do you have a cellphone always connected to the internet? Do you connect to every public WiFi available? In article…

  • Knowledge Management

    Knowledge Management

    The training is crucial part of every company' s security policy. There is an analysis below of a "Knowledge…

    1 条评论
  • Nmap on Twitter

    Nmap on Twitter

    This is only small post, an appetizer generated during processing, I will add more details in future on my website…

    2 条评论
  • A Botnet was using DNS tunneling for its C&C operations

    A Botnet was using DNS tunneling for its C&C operations

    Another great example of contribution of big data analysis to IT Security operations. Data were collected by using a…

    2 条评论
  • My own social network - hackers would love to do this.

    My own social network - hackers would love to do this.

    One of the good use cases for so called "big data" approach is modeling of private social network. Same of course…

  • IT Security meets Data Science

    IT Security meets Data Science

    Quote: The purpose of abstraction: “Is not to be vague but to create a new semantic level on which one can be…

社区洞察

其他会员也浏览了