dc.contributor.advisor | Dadoyan, Christoforos | |
dc.contributor.advisor | Νταντογιάν, Χριστόφορος | |
dc.contributor.author | Makris, Christos | |
dc.contributor.author | Μακρής, Χρήστος | |
dc.date.accessioned | 2020-04-03T14:17:14Z | |
dc.date.available | 2020-04-03T14:17:14Z | |
dc.date.issued | 2020-02-01 | |
dc.identifier.uri | https://dione.lib.unipi.gr/xmlui/handle/unipi/12666 | |
dc.identifier.uri | http://dx.doi.org/10.26267/unipi_dione/89 | |
dc.format.extent | 36 | el |
dc.language.iso | en | el |
dc.publisher | Πανεπιστήμιο Πειραιώς | el |
dc.title | Evaluation of the detection capabilities of the open source SIEM HELK | el |
dc.title.alternative | Αξιολόγηση των δυνατοτήτων ανίχνευσης του ανοικτού λογισμικού SIEM HELK | el |
dc.type | Master Thesis | el |
dc.contributor.department | Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτων | el |
dc.description.abstractEN | In this thesis we examine the use and the capabilities of the HELK SIEM as implemented by
Roberto Rodriguez. The appliance is based on three lately introduced analytics tools,
Elasticsearch – Logstash – Kibana (ELK) by which it was named by, appended by the letter
(H) to define its threat Hunting purpose. After going through the installation process and
multiple configurations, the HELK is tested in order to define its efficiency, by simulating
several conditions. These conditions could be HELK’s task is to detect, could be a suspicious
activity, an ongoing cyber attack or a malware of infection of a system. | el |
dc.contributor.master | Ασφάλεια Ψηφιακών Συστημάτων | el |
dc.subject.keyword | HELK | el |
dc.subject.keyword | SIEM | el |
dc.subject.keyword | Kibana | el |
dc.subject.keyword | Elastic | el |
dc.subject.keyword | Logstash | el |
dc.date.defense | 2020-02-27 | |