I. Introduction
Nowadays, more services are being provided online; and so more potential weak points are available to be exploited. According to [1], more than 200 million records were exposed just in the first half of 2015. A single hacking attack exposed about 78 million of those records. The number rose to more than 15 billion records in 2019 making it the worst recorded year [2]. It is worth mentioning that this problem is a domain-crossing one, as there is not a sector which uses technology that can be considered safe from such threats. Whether it is business, education, health, or even governmental systems, they are all at risk if proper precautions are not taken. With continuously changing and developing technology, infrastructure can easily become unstable and vulnerable. Therefore, any security system needs to be able to quickly react to any changes within its environment. In order to achieve that, information from different resources and systems needs to be collected and integrated to help analyze occurring events, support decision-making, register feedback after applying those decisions, and extract knowledge useful for future incidents prevention [3].