Effective Security Monitoring Using Efficient SIEM Architecture

被引:1
|
作者
Sheeraz, Muhammad [1 ]
Paracha, Muhammad Arsalan [1 ]
Ul Haque, Mansoor [1 ]
Durad, Muhammad Hanif [1 ]
Mohsin, Syed Muhammad [2 ,3 ]
Band, Shahab S. [4 ]
Mosavi, Amir [5 ,6 ]
机构
[1] Pakistan Inst Engn & Appl Sci PIEAS, Dept Comp & Informat Sci, Islamabad, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[3] Virtual Univ Pakistan, Coll Intellectual Novitiates COIN, Lahore, Pakistan
[4] Natl Yunlin Univ Sci & Technol, Coll Future, Future Technol Res Ctr, Touliu, Taiwan
[5] Univ Publ Serv, Inst Informat Soc, Budapest, Hungary
[6] Obuda Univ, Fac Informat, Budapest, Hungary
关键词
Security Information and Event Management; Security Operation Center; Data Aggregation; Log Formats; Data Normalization; Event Correlation; Correlation Engine; Big Data;
D O I
10.22967/HCIS.2023.13.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unprecedented advances and myriad benefits of the internet have made it indispensable for almost every organization. With its growing popularity and widespread use, the problem of security threats has emerged to the forefront, while attacks are constantly on the rise. Therefore, an organization must continuously monitor its security status to take immediate remedial measures. Security information and event management (SIEM) systems in tandem with security orchestration, automation, and response (SOAR) systems are an integral part of a security operation center (SOC) because this not only further helps organizations gain a holistic view of their security status but also protects their IT infrastructure. In this research paper, we will provide discussions on the latest and most advanced and widely used SIEM systems. These include both open-source and proprietary solutions. However, as documented in literature, no comprehensive SIEM system architecture is available. The main contribution of this research work is that we have proposed a comprehensive, well-defined and modular architecture of the SIEM system. Each module has been discussed in detail with reference to its input parameters, processing, and output details. This modular approach will help developers extend the functionality of the SIEM system without compromising the overall performance and integration issues, while also helping end users make better decisions to select a SIEM system.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] SIEM Selection Criteria for an efficient contextual security
    Nabil, Moukafih
    Soukaina, Sabir
    Lakbabi, Abdelmajid
    Ghizlane, Orhanou
    2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,
  • [2] Toward the SIEM Architecture for Cloud-based Security Services
    Lee, Jong-Hoon
    Kim, Young Soo
    Kim, Jong Hyun
    Kim, Ik Kyun
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 398 - 399
  • [3] Real time monitoring of security events for forensic purposes in Cloud environments using SIEM
    Bachane, Imane
    Adsi, Youness Idrissi Khamlichi
    Adsi, Habiba Chaoui
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P18 - P20
  • [4] Enhancing Cloud Security-Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
    Tuyishime, Emmanuel
    Balan, Titus C.
    Cotfas, Petru A.
    Cotfas, Daniel T.
    Rekeraho, Alexandre
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [5] Real-time Anomaly Detection in SDN Architecture using Integrated SIEM and Machine Learning for Enhancing Network Security
    Sebbar, Anass
    Cherqi, Othmane
    Chougdali, Khalid
    Boulmalf, Mohammed
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1795 - 1800
  • [6] Information Technology Security (ITSec): The Effects of SIEM Technology in Monitoring Employee Computer Use
    Sandoval, Roberto
    AMCIS 2014 PROCEEDINGS, 2014,
  • [7] A SIEM Architecture for Multidimensional Anomaly Detection
    Laue, Tim
    Kleiner, Carsten
    Detken, Kai-Oliver
    Klecker, Timo
    PROCEEDINGS OF THE THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 1, 2021, : 136 - 142
  • [8] A NETWORK MONITORING AND CONTROL SECURITY ARCHITECTURE
    SEVCIK, PJ
    KORN, LK
    INTEGRATED NETWORK MANAGEMENT, 1, 1989, : 257 - 268
  • [9] Effective, Efficient and Robust Neural Architecture Search Effective, Efficient and Robust Neural Architecture Search
    Yue, Zhixiong
    Lin, Baijiong
    Zhang, Yu
    Liang, Christy
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [10] Architecture for security monitoring in IoT environments
    Stergiou, Christos
    Psannis, Kostas E.
    Plageras, Andreas P.
    Kokkonis, Giorgos
    Ishibashi, Yutaka
    2017 IEEE 26TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2017, : 1382 - 1385