Searched for: subject%3A%22SoC%22
(1 - 2 of 2)
document
Vermeer, M. (author), Kadenko, N.I. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author), Parkin, S.E. (author)
Signature-based network intrusion detection systems (NIDSs) and network intrusion prevention systems (NIPSs) remain at the heart of network defense, along with the rules that enable them to detect threats. These rules allow Security Operation Centers (SOCs) to properly defend a network, yet we know almost nothing about how rules are created,...
conference paper 2023
document
Vermeer, M. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environments. We partner with a Managed Security Service Provider (MSSP) to...
conference paper 2022