Manya Ali Salitin’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Figure.2. User Entity Behavior Analytics Model
Figure .1. Hype Cycle for Risk Management Solutions (Source; Gartner, 2016)
Evaluation criteria for network security solutions based on behaviour analytics
  • Article
  • Full-text available

January 2023

·

70 Reads

·

2 Citations

International Journal of Systems Control and Communications

Manya Ali Salitin

·

Download


Figure.2. User Entity Behavior Analytics Model
Figure .1. Hype Cycle for Risk Management Solutions (Source; Gartner, 2016)
The role of User Entity Behavior Analytics to detect network attacks in real time

November 2018

·

9,361 Reads

·

51 Citations

Organizations are using advanced security solutions to protect their information resources. However, even such high investments, traditional security approaches failed to protect the network structure against state-of-the-art attacks. New proactive approaches to security are on the rise such as User Entity Behavior Analytics (UEBA). UEBA is a type of cybersecurity process that uses machine learning, algorithms, and statistical analyses to detect real-time network attacks. This paper aims to assess the value and success of using behavior analytics in securing the network from not-before-seen attacks such as zero-day attacks. This paper uses a systematic literature review and self-administrated survey and interviews with convenience sampling of high profile network users and top security vendors. Survey and interviews with various security experts are utilized to verify the matter-of-fact effectiveness of the solutions based on behavior analytics. During collecting the primary data via a survey, researchers will go for a structured interview with vendors who are selling solutions to understand the performance of behavior analytics-based solutions and the distinct features of their solutions. The results of literature review, survey, interviews and focus groups will be used to assess the value and success of using behavior analytics in securing the network from not-before-seen attacks such as zeroday attacks. The endeavor of this paper is to highlight the weaknesses and strengths of different UEBA solutions and their effectiveness for detecting network attacks in real-time interaction. This research contrasts top fifteen UEBA technologies based on use cases and capabilities and highlights common usage scenarios. Based on the evidence, recommendations will be given.

Citations (1)


... AI-based techniques like User and Event Behavioural Analytics (UEBA) can analyse the baseline behaviour of user accounts, and endpoints, and identify anomalous behaviour such as a zero-day attack [45]. AI can optimize and continuously monitor processes like cooling filters, power consumption, internal temperatures, and bandwidth usage to alert of any failures and provide insights into valuable improvements on the effectiveness and security of the infrastructure [46]. ...

Reference:

Utilisation of Artificial Intelligence and Cyber Security Capabilities The Symbiotic Relationship for Enhanced Security and Applicability
The role of User Entity Behavior Analytics to detect network attacks in real time