APPROACHES TO ENHANCING CYBER THREAT MONITORING SYSTEMS IN CORPORATE NETWORKS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.903

Keywords:

cyber threat, cybersecurity, Internet of Things, cloud service, proactive monitoring, , machine learning

Abstract

The paper explores the theoretical foundations and practical aspects of implementing cyber threat monitoring systems in corporate information systems. It analyzes their role in ensuring organizational information security and examines modern approaches to threat detection, along with current trends in the development of cyber threat monitoring systems within corporate networks. Special attention is given to the role of monitoring as a key component of corporate security, providing continuous oversight of network activity, information systems, and endpoint devices. This approach enables timely identification of potential threats and rapid response to emerging incidents. The use of advanced analytical tools and technologies facilitates the detection of anomalous behavior and suspicious patterns that may indicate attempts at unauthorized access, malware infections, or the manifestation of insider threats. Continuous monitoring of the state of the information infrastructure contributes to the early detection of vulnerabilities and mitigation of risks before they result in data breaches, financial losses, or reputational damage. The study highlights the limitations of traditional cybersecurity tools, which often prove inadequate in detecting complex and dynamic threats. In response, modern approaches to monitoring and incident response are proposed, incorporating the use of cutting-edge tools and intrusion detection algorithms. The proposed solutions aim to enhance the efficiency of cybersecurity efforts in the context of an increasingly complex cyber threat landscape. Systematic documentation and analysis of security events enable the generation of reliable audit reports on the current state of the information system, which are essential for incident investigations. The primary focus is placed on the technical implementation of monitoring systems, the integration of machine learning algorithms, the use of virtual environments for attack simulation, and the design of secure corporate network architectures. Additionally, practical recommendations are provided to improve threat monitoring effectiveness, particularly through the adoption of automation and artificial intelligence

Downloads

Download data is not yet available.

References

Shan, A., & Myeong, S. (2024). Proactive threat hunting in critical infrastructure protection through hybrid machine learning algorithm application. Sensors, 24(15), 4888. https://doi.org/10.3390/s24154888

Arash, M., Khanh, L., Hamed, A., & al. (2024). Evolving techniques in cyber threat hunting: A systematic review. Journal of Network and Computer Applications, 232, December 2024. https://doi.org/10.1016/j.jnca.2024.104004

Ali, S., & Seunghwan, M. (2024). Proactive threat hunting in critical infrastructure protection through hybrid machine learning algorithm application. Sensors (Basel), 24(15), 4888. https://doi.org/10.3390/s24154888

Rosenberg, I., Shabtai, A., Elovici, Y., & Rokach, L. (2020). Adversarial machine learning attacks and defense methods in the cybersecurity domain. arXiv. https://doi.org/10.48550/arXiv.2007.02407

European Union Agency for Cybersecurity (ENISA). (2024). ENISA threat landscape 2024: July 2023 to June 2024. Retrieved from https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024

Alotaibi, S., & Furnell, S. (2024). Emerging trends in cybersecurity: A holistic view on current challenges and integrative solutions. Blockchain Healthcare Today, 7. https://doi.org/10.30953/bhty.v7.302

Alexei, A., et al. (2022). The holistic approach to cybersecurity in academia. In CEEeGov '22: Proceedings of the Central and Eastern European eDem and eGov Days (pp. 106–111). ACM. https://doi.org/10.1145/3551504.3551516

Haselmann, T., & Davy, J. (2023). Information security policies compliance in a global setting. Computers & Security. https://doi.org/10.1016/j.cose.2023.102944

National Institute of Standards and Technology. (2024). The NIST Cybersecurity Framework (CSF) 2.0. https://doi.org/10.6028/NIST.CSWP.29

International Organization for Standardization. (2022). ISO/IEC 27001:2022 — Information security, cybersecurity and privacy protection — Information security management systems — Requirements. https://www.iso.org/standard/88435.htm

Li, H., Yu, L., & He, W. (2019). The impact of GDPR on global technology development. Journal of Global Information Technology Management, 22(1), 1–6.

Aldweesh, A., Moustafa, N., & Slay, J. (2021). Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy and open issues. Journal of Network and Computer Applications, 178, 102983. https://doi.org/10.1016/j.jnca.2020.102983

Khokh, V. D., Meleshko, Ye. V., & Smirnov, O. A. (2017). Research of methods for auditing information security management systems. Systems of Control, Navigation and Communication: Collection of Scientific Papers, 1(41), 38–42.

Downloads


Abstract views: 7

Published

2025-09-26

How to Cite

Tyshyk Т. (2025). APPROACHES TO ENHANCING CYBER THREAT MONITORING SYSTEMS IN CORPORATE NETWORKS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 548–558. https://doi.org/10.28925/2663-4023.2025.29.903