Effective Security Monitoring Using Efficient SIEM Architecture

被引:1
|
作者
Sheeraz, Muhammad [1 ]
Paracha, Muhammad Arsalan [1 ]
Ul Haque, Mansoor [1 ]
Durad, Muhammad Hanif [1 ]
Mohsin, Syed Muhammad [2 ,3 ]
Band, Shahab S. [4 ]
Mosavi, Amir [5 ,6 ]
机构
[1] Pakistan Inst Engn & Appl Sci PIEAS, Dept Comp & Informat Sci, Islamabad, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[3] Virtual Univ Pakistan, Coll Intellectual Novitiates COIN, Lahore, Pakistan
[4] Natl Yunlin Univ Sci & Technol, Coll Future, Future Technol Res Ctr, Touliu, Taiwan
[5] Univ Publ Serv, Inst Informat Soc, Budapest, Hungary
[6] Obuda Univ, Fac Informat, Budapest, Hungary
关键词
Security Information and Event Management; Security Operation Center; Data Aggregation; Log Formats; Data Normalization; Event Correlation; Correlation Engine; Big Data;
D O I
10.22967/HCIS.2023.13.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unprecedented advances and myriad benefits of the internet have made it indispensable for almost every organization. With its growing popularity and widespread use, the problem of security threats has emerged to the forefront, while attacks are constantly on the rise. Therefore, an organization must continuously monitor its security status to take immediate remedial measures. Security information and event management (SIEM) systems in tandem with security orchestration, automation, and response (SOAR) systems are an integral part of a security operation center (SOC) because this not only further helps organizations gain a holistic view of their security status but also protects their IT infrastructure. In this research paper, we will provide discussions on the latest and most advanced and widely used SIEM systems. These include both open-source and proprietary solutions. However, as documented in literature, no comprehensive SIEM system architecture is available. The main contribution of this research work is that we have proposed a comprehensive, well-defined and modular architecture of the SIEM system. Each module has been discussed in detail with reference to its input parameters, processing, and output details. This modular approach will help developers extend the functionality of the SIEM system without compromising the overall performance and integration issues, while also helping end users make better decisions to select a SIEM system.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Effective and efficient test architecture design for SOCs
    Goel, SK
    Marinissen, EJ
    INTERNATIONAL TEST CONFERENCE 2002, PROCEEDINGS, 2002, : 529 - 538
  • [32] A Big Data Architecture for Large Scale Security Monitoring
    Marchal, Samuel
    Jiang, Xiuyan
    State, Radu
    Engel, Thomas
    2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 56 - 63
  • [33] Security Architecture for Secure Train Control and Monitoring System
    Purwanto, Yudha
    Ruriawan, Muhammad Faris
    Alamsyah, Andry
    Wijaya, Febry Pandu
    Husna, Dewi Nala
    Kridanto, Agri
    Nugroho, Fifin
    Fakhrudin, Anang
    Itqon, Mu'ammar
    Febrianta, Mochamad Yudha
    Widiyanesti, Sri
    Mentari, Fussy
    Gozali, Alfian Akbar
    Romadhony, Ade
    SENSORS, 2023, 23 (03)
  • [34] SARFUM: Security Architecture for Remote FPGA Update and Monitoring
    Badrignans, Benoit
    Champagne, David
    Elbaz, Reouven
    Gebotys, Catherine
    Torres, Lionel
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [35] A Framework Architecture for Agentless Cloud Endpoint Security Monitoring
    Ghaleb, Asem
    Traore, Issa
    Ganame, Karim
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019,
  • [36] A Security Monitoring Architecture based on Data Plane Programmability
    Alsadi, Amir
    Berardi, Davide
    Callegati, Franco
    Melis, Andrea
    Prandini, Marco
    2021 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT), 2021, : 389 - 394
  • [37] HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks
    Akestoridis, Dimitrios-Georgios
    Tague, Patrick
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 209 - 217
  • [38] A hybrid architecture design for security monitoring via the Internet
    Fong, ACM
    Hui, SC
    KYBERNETES, 2003, 32 (9-10) : 1297 - 1312
  • [39] Cloud Slicing A new Architecture for Cloud Security Monitoring
    Aldribi, Abdulaziz
    Traore, Issa
    Letourneau, Gabriel
    2015 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2015, : 18 - 22
  • [40] Addressing security issues in the eHeatlh domain relying on SIEM solutions
    Coppolino, Luigi
    D'Antonio, Salvatore
    Romano, Luigi
    Sgaglione, Luigi
    Staffa, Mariacarla
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 510 - 515