Effective Security Monitoring Using Efficient SIEM Architecture

被引:1
|
作者
Sheeraz, Muhammad [1 ]
Paracha, Muhammad Arsalan [1 ]
Ul Haque, Mansoor [1 ]
Durad, Muhammad Hanif [1 ]
Mohsin, Syed Muhammad [2 ,3 ]
Band, Shahab S. [4 ]
Mosavi, Amir [5 ,6 ]
机构
[1] Pakistan Inst Engn & Appl Sci PIEAS, Dept Comp & Informat Sci, Islamabad, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[3] Virtual Univ Pakistan, Coll Intellectual Novitiates COIN, Lahore, Pakistan
[4] Natl Yunlin Univ Sci & Technol, Coll Future, Future Technol Res Ctr, Touliu, Taiwan
[5] Univ Publ Serv, Inst Informat Soc, Budapest, Hungary
[6] Obuda Univ, Fac Informat, Budapest, Hungary
关键词
Security Information and Event Management; Security Operation Center; Data Aggregation; Log Formats; Data Normalization; Event Correlation; Correlation Engine; Big Data;
D O I
10.22967/HCIS.2023.13.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unprecedented advances and myriad benefits of the internet have made it indispensable for almost every organization. With its growing popularity and widespread use, the problem of security threats has emerged to the forefront, while attacks are constantly on the rise. Therefore, an organization must continuously monitor its security status to take immediate remedial measures. Security information and event management (SIEM) systems in tandem with security orchestration, automation, and response (SOAR) systems are an integral part of a security operation center (SOC) because this not only further helps organizations gain a holistic view of their security status but also protects their IT infrastructure. In this research paper, we will provide discussions on the latest and most advanced and widely used SIEM systems. These include both open-source and proprietary solutions. However, as documented in literature, no comprehensive SIEM system architecture is available. The main contribution of this research work is that we have proposed a comprehensive, well-defined and modular architecture of the SIEM system. Each module has been discussed in detail with reference to its input parameters, processing, and output details. This modular approach will help developers extend the functionality of the SIEM system without compromising the overall performance and integration issues, while also helping end users make better decisions to select a SIEM system.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] SIEM-SC: Cost analysis of security policies in SIEM events from the sustainability point of view
    Lopez Velasquez, Juan Miguel
    Martinez Monterrubio, Sergio Mauricio
    Sanchez Crespo, Luis Enrique
    Garcia Rosado, David
    2023 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND SOFTWARE TECHNOLOGIES, ICI2ST 2023, 2023, : 112 - 119
  • [22] Security Analysis of Wireless Sensor Networks Using SIEM and Multi-agent Approach
    Vasilyev, Vladimir
    Shamsutdinov, Rinat
    2020 GLOBAL SMART INDUSTRY CONFERENCE (GLOSIC), 2020, : 291 - 296
  • [23] Agile security using an incremental security architecture
    Chivers, H
    Paige, RF
    Ge, XC
    EXTREME PROGRAMMING AND AGILE PROCESSES IN SOFTWARE ENGINEERING, PROCEEDINGS, 2005, 3556 : 57 - 65
  • [24] Near-miss situation based visual analysis of SIEM rules for real time network security monitoring
    Majeed, Abdul
    Rasool, Raihan Ur
    Ahmad, Farooq
    Alam, Masoom
    Javaid, Nadeem
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (04) : 1509 - 1526
  • [25] Heterogeneous Network Security Effective Monitoring Method
    Kalashnikov, A. O.
    Anikina, E., V
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2019), 2019, 1141 : 625 - 635
  • [26] Effective Security Architecture for Virtualized Data Center Networks
    Chidiebele, Udeze C.
    Kennedy, Okafor C.
    Inyiama, H. C.
    Okezie, C. C.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (01) : 196 - 200
  • [27] On the design of a cost effective network security switch architecture
    Huang, NF
    Chen, CH
    Liu, RT
    Kao, CN
    Wu, CC
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1012 - 1016
  • [28] Near-miss situation based visual analysis of SIEM rules for real time network security monitoring
    Abdul Majeed
    Raihan ur Rasool
    Farooq Ahmad
    Masoom Alam
    Nadeem Javaid
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1509 - 1526
  • [29] An Efficient Security Architecture for Wireless Sensor Networks using Pseudo-inverse Matrix
    Chowdhury, Anuva
    Tanzila, Farzana Alam
    Chowdhury, Shanta
    Haque, Md. Mokammel
    2015 18TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2015, : 396 - 400
  • [30] Energy Efficient Outdoor Light Monitoring and Control Architecture Using Embedded System
    Kaleem, Zeeshan
    Yoon, Tae Min
    Lee, Chankil
    IEEE EMBEDDED SYSTEMS LETTERS, 2016, 8 (01) : 18 - 21