Synergistic Evaluation of Computer Network Security Using Attack Graphs and Security Event Processing

Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 05

Abstract

This study presents an intricate evaluation framework for enhancing computer network security through converging attack graph analysis and security event processing (SEP). The researchers construct a comprehensive methodology integrating these techniques to systematically identify vulnerabilities, visualize potential attack paths, and implement real-time threat monitoring. The findings demonstrate the efficacy of this integrated approach in fortifying network defenses and minimizing exposure to cyber threats.

Authors and Affiliations

Percy Piquero Mutas , Jerry I. Teleron

Keywords

Related Articles

APPLICATION OF EXPERT TOOL IN OPTIMIZING AND PREDICTING MILD STEEL WELD REINFORCEMENT FORM FACTOR (WRFF) IN TIG WELDING PROCESS

Welding is a process designed to permanently join pieces of materials together to produce weldments which significantly enhance the strength, reliability, and integrity of structural materials. It is imperative to know t...

Blockchain's Transformative Potential in Securing Digital Identities and Personal Data

This review paper explores the transformative potential of blockchain technology in securing digital identities and personal data. It examines various blockchain applications, including identity verification, self-sovere...

Exploring the Effectiveness of Meme-Based Learning on Nigerian University Students’ Engagement, Motivation, and Understanding of Complex Concepts: A Survey Study

This study investigated the effectiveness of meme-based learning on Nigerian university students' engagement, motivation, and understanding of complex concepts. Using a survey design, the research involved 60 students fr...

PLANT DISEASE DETECTION BY USING MOBILENTV2 AND XCEPTION ON FILTERED AND ENHANCED IMAGES

The gathering, sorting, and processing of plant leaf images serves as the foundation for this study. These are crucial first steps in the plant health monitoring process that guarantee reliable findings. The work classif...

Design and Implementation of a 3D-Printed Robotics Manipulator for Object Detection and Grasping

This paper presents the design and implementation of a 3D-printed robotic manipulator tailored mainly for object detection and grasping. The robot is constructed with PLA material using a known design framework; it is no...

Download PDF file
  • EP ID EP735832
  • DOI 10.47191/etj/v9i05.34
  • Views 56
  • Downloads 0

How To Cite

Percy Piquero Mutas, Jerry I. Teleron (2024). Synergistic Evaluation of Computer Network Security Using Attack Graphs and Security Event Processing. Engineering and Technology Journal, 9(05), -. https://europub.co.uk/articles/-A-735832