Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2938
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Weeraman, P.W.R.S. | - |
dc.date.accessioned | 2022-08-24T09:03:45Z | - |
dc.date.available | 2022-08-24T09:03:45Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2938 | - |
dc.description.abstract | Digital transformation is the standard business strategy approach in most Organizations. Every person is looking for digital solutions to aid their routine works. Every Organization looking possibility move to physical office concept for virtual office concept. Even homemakers and bargain hunters also expect to move online shopping with doorstep delivery solutions with this COVID-19 pandemic. Every business needs to adopt IT functions for their business process to ensure business stability or increase their revenue. Most large-scale enterprises have a dedicated IT strategy approach to align with their business strategy. They follow best IT security practices such as SIEM, security operation centers (SOC), annual IT compliance review, IT audit and best security devices in the market. However, most of the business do IT system adoption without a preplanned process. They do not follow any best it practices in term of IT security. Further, they do not have a proper IT strategy that aligns with business objectives. Most small and medium scale business with minimum IT infrastructures and IT operations. The absence of a proper IT security approach in the business may introduce new IT risk to their information and business. This Research makes experimental approach to adopt cyber threat intelligence to SIEM detection base using adversary tactic, technique, procedure (TTP) and machine learning (ML) instead of signature-based detection methods. TTP change is relatively more challenging than IP address or file hash change. This research concern uses TTP-based Security information and event management systems (SIEM) solution using open-source software and MITRE ATT&CK community framework. Further, this Research aims to reduce operating expenses and capital expenses using a community-based framework and opensource software. | en_US |
dc.language.iso | en | en_US |
dc.subject | COVID-19 | en_US |
dc.subject | MITRE ATT&CK | en_US |
dc.subject | Framework | en_US |
dc.subject | open-source | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | network security | en_US |
dc.subject | security | en_US |
dc.subject | management | en_US |
dc.subject | computer security | en_US |
dc.subject | SIEM | en_US |
dc.subject | Log analysis | en_US |
dc.subject | SOC | en_US |
dc.subject | incident management | en_US |
dc.subject | cyber forensics | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Big data | en_US |
dc.subject | SMB | en_US |
dc.subject | SONAR | en_US |
dc.subject | SNORT | en_US |
dc.subject | Threat intelligent | en_US |
dc.subject | CTI | en_US |
dc.subject | ML | en_US |
dc.subject | SOC | en_US |
dc.title | MITRE ATTACK FRAMEWORK ADOPTION AS A SIEM RULE BASE USING MACHINE LEARNING APPROACH | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | MSc 2021 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
MS19801582_CS_IT6010.pdf Until 2050-12-31 | 1.83 MB | Adobe PDF | View/Open Request a copy | |
MS19801582_CS_IT6010_Abs.pdf | 296.74 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.