{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:13:46Z","timestamp":1742973226984,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031354663"},{"type":"electronic","value":"9783031354670"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35467-0_15","type":"book-chapter","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:02:04Z","timestamp":1686978124000},"page":"224-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Linked List Systems for System Logs Protection from Cyberattacks"],"prefix":"10.1007","author":[{"given":"Victor","family":"Boyko","sequence":"first","affiliation":[]},{"given":"Mykola","family":"Vasilenko","sequence":"additional","affiliation":[]},{"given":"Valeria","family":"Slatvinska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1177\/0093854819900322","volume":"47","author":"TJ Holt","year":"2020","unstructured":"Holt, T.J., Leukfeldt, R., Van De Weijer, S.: An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Crim. Justice Behav. 47(4), 487\u2013505 (2020)","journal-title":"Crim. Justice Behav."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ozer, M., Varlioglu, S., Gonen, B., Adewopo, V., Elsayed, N., Zengin S.: Cloud incident response: Challenges and opportunities. In: 2020 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, pp. 49\u201354 (2020)","DOI":"10.1109\/CSCI51800.2020.00015"},{"key":"15_CR3","unstructured":"Blunden, B.: The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. Jones & Bartlett Publishers, pp. 783 (2012)"},{"key":"15_CR4","unstructured":"Harley, D., Lee, A.: The root of all evil? - rootkits revealed, pp. 1\u201317 (2007)"},{"key":"15_CR5","unstructured":"Chen, X., Andersen, J., Mao, Z.M., Bailey, M., Nazario, J.: Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In: 2008 IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN). IEEE, pp. 177\u2013186 (2008)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Aslan, \u00d6.A., Samet, R.A.: Comprehensive review on malware detection approaches. IEEE Access Inst. Electr. Electron. Eng. (IEEE) 8, 6249\u20136271 (2020)","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.future.2020.07.015","volume":"113","author":"JC Sancho","year":"2020","unstructured":"Sancho, J.C., Caro, A., \u00c1vila, M., Bravo, A.: New approach for threat classification and security risk estimations based on security event management. Futur. Gener. Comput. Syst. 113, 488\u2013505 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"15_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1013886.1007518","volume":"29","author":"M Christodorescu","year":"2004","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. ACM SIGSOFT Softw. Eng. Notes 29(4), 34\u201344 (2004)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-006-0028-7","volume":"2","author":"W Wong","year":"2006","unstructured":"Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211\u2013229 (2006)","journal-title":"J. Comput. Virol."},{"issue":"3","key":"15_CR10","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11416-008-0086-0","volume":"4","author":"G Jacob","year":"2008","unstructured":"Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4(3), 251\u2013266 (2008)","journal-title":"J. Comput. Virol."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Yu, B., Fang Y., Yang, Q., Tang, Y., Liu, L.: A survey of malware behavior description and analysis. Front. Inf. Technol. Electron. Eng. 19(5), 583\u2013603 (2018)","DOI":"10.1631\/FITEE.1601745"},{"issue":"7","key":"15_CR12","doi-asserted-by":"publisher","first-page":"781","DOI":"10.3390\/electronics10070781","volume":"10","author":"K Demertzis","year":"2021","unstructured":"Demertzis, K., Tsiknas, K., Takezis, D., Skianis, C., Iliadis, L.: Darknet traffic big-data analysis and network management to real-time automating the malicious intent detection process by a weight agnostic neural networks framework. Electronics 10(7), 781 (2021)","journal-title":"Electronics"},{"key":"15_CR13","unstructured":"Hangxia, Z., Peng, Z., Yong, Y.: Web log system of automatic backup and remote analysis. In: 2010 International Conference on Computer Application and System Modeling (ICCASM). IEEE, pp. 469\u2013472 (2010)"},{"key":"15_CR14","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-0-387-44599-1_8","volume-title":"An Inside Look at Botnets","author":"P Barford","year":"2007","unstructured":"Barford, P., Yegneswaran, V.: An Inside Look at Botnets. Advances in Information Security, pp. 171\u2013191. Springer, US (2007)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Cinque, M., Cotroneo, D., Pecchia, A.: Challenges and directions in security information and event management (SIEM). In: 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, pp. 95\u201399 (2018)","DOI":"10.1109\/ISSREW.2018.00-24"},{"issue":"14","key":"15_CR16","first-page":"1","volume":"21","author":"G Gonz\u00e1lez-Granadillo","year":"2021","unstructured":"Gonz\u00e1lez-Granadillo, G., Gonz\u00e1lez-Zarzosa, S., Diaz, R.: Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors. MDPI AG 21(14), 1\u201328 (2021)","journal-title":"Sensors. MDPI AG"},{"key":"15_CR17","unstructured":"Johnson, J.: Average number of days to resolve a cyber attack on companies in the United States as of august 2015, by attack type 2015 (2022). https:\/\/www.statista.com\/statistics\/193463\/average-days-to-resolve-a-cyber-attack-in-us-companies-by-attack\/"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"IBM. Cost of a Data Breach Report 2020 (2021). https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\/#\/ru","DOI":"10.1016\/S1361-3723(21)00082-8"},{"key":"15_CR19","unstructured":"Mandiant. Mandiant Security Effectiveness Report. FireEye. 1\u201322 (2020). https:\/\/www.fireeye.com\/current-threats\/annual-threat-report\/security-effectiveness-report.html"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Bryant, B.D., Saiedian, H.: Improving SIEM alert metadata aggregation with a novel kill-chain based classification model. Comput. Secur. 94, 1\u201323 (2020)","DOI":"10.1016\/j.cose.2020.101817"},{"key":"15_CR21","unstructured":"Indicator Removal on Host: Clear Linux or Mac System Logs, Sub-technique T1070.002. Enterprise MITRE ATT&CK (2022). https:\/\/attack.mitre.org\/techniques\/T1070\/002"},{"key":"15_CR22","unstructured":"L\u00e9veill\u00e9, M.-E., Sanmillan, I.A: WILD KOBALOS APPEARS: Tricksy linux malware goes after HP. ESET Research White Paper, pp. 1\u201331 (2021). https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2021\/01\/ESET_Kobalos.pdf"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Information Technology for Education, Science, and Technics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35467-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:03:55Z","timestamp":1686978235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35467-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031354663","9783031354670"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35467-0_15","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITEST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific-Practical Conference \"Information Technology for Education, Science and Technics\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cherkasy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itest2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itest.chdtu.edu.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}