Effective Security Monitoring Using Efficient SIEM Architecture

被引:1
|
作者
Sheeraz, Muhammad [1 ]
Paracha, Muhammad Arsalan [1 ]
Ul Haque, Mansoor [1 ]
Durad, Muhammad Hanif [1 ]
Mohsin, Syed Muhammad [2 ,3 ]
Band, Shahab S. [4 ]
Mosavi, Amir [5 ,6 ]
机构
[1] Pakistan Inst Engn & Appl Sci PIEAS, Dept Comp & Informat Sci, Islamabad, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[3] Virtual Univ Pakistan, Coll Intellectual Novitiates COIN, Lahore, Pakistan
[4] Natl Yunlin Univ Sci & Technol, Coll Future, Future Technol Res Ctr, Touliu, Taiwan
[5] Univ Publ Serv, Inst Informat Soc, Budapest, Hungary
[6] Obuda Univ, Fac Informat, Budapest, Hungary
关键词
Security Information and Event Management; Security Operation Center; Data Aggregation; Log Formats; Data Normalization; Event Correlation; Correlation Engine; Big Data;
D O I
10.22967/HCIS.2023.13.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unprecedented advances and myriad benefits of the internet have made it indispensable for almost every organization. With its growing popularity and widespread use, the problem of security threats has emerged to the forefront, while attacks are constantly on the rise. Therefore, an organization must continuously monitor its security status to take immediate remedial measures. Security information and event management (SIEM) systems in tandem with security orchestration, automation, and response (SOAR) systems are an integral part of a security operation center (SOC) because this not only further helps organizations gain a holistic view of their security status but also protects their IT infrastructure. In this research paper, we will provide discussions on the latest and most advanced and widely used SIEM systems. These include both open-source and proprietary solutions. However, as documented in literature, no comprehensive SIEM system architecture is available. The main contribution of this research work is that we have proposed a comprehensive, well-defined and modular architecture of the SIEM system. Each module has been discussed in detail with reference to its input parameters, processing, and output details. This modular approach will help developers extend the functionality of the SIEM system without compromising the overall performance and integration issues, while also helping end users make better decisions to select a SIEM system.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Common Framework for Attack Modeling and Security Evaluation in SIEM Systems
    Kotenko, Igor
    Chechulin, Andrey
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 94 - 101
  • [42] An Efficient Security System for Mobile Data Monitoring
    Liu, Likun
    Zhang, Hongli
    Yu, Xiangzhan
    Xin, Yi
    Shafiq, Muhammad
    Ge, Mengmeng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [43] The efficient security architecture for authentication and authorization in the home network
    Lee, Hyungkyu
    Lee, Jooyoung
    Han, Jongwook
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 713 - +
  • [44] Power-Efficient Architecture of Zigbee Security Processing
    Kim, Jiho
    Lee, Jungyu
    Song, Ohyoung
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 773 - 778
  • [45] Energy efficient security architecture for wireless sensor networks
    Zivkovic, Miodrag
    Branovic, Irina
    Markovic, Dragan
    Popovic, Ranko
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 1524 - 1527
  • [46] In-Memory Computing Architecture for Efficient Hardware Security
    Ajmi, Hala
    Zayer, Fakhreddine
    Belgacem, Hamdi
    arXiv,
  • [47] In-Memory Computing Architecture for Efficient Hardware Security
    Ajmi, Hala
    Zayer, Fakhreddine
    Belgacem, Hamdi
    2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024, 2024, : 71 - 76
  • [48] Formal Verification of an Efficient Architecture to Enhance the Security in IoT
    Elsayed, Eman K.
    Diab, L. S.
    Ibrahim, Asmaa A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 134 - 139
  • [49] Architecture for efficient monitoring and management of sensor networks
    Younis, M
    Munshi, P
    Al-Shaer, E
    MANAGEMENT OF MULTIMEDIA NETWORKS AND SERVICES, PROCEEDINGS, 2003, 2839 : 488 - 502
  • [50] Effective monitoring by efficient fingerprint matching using a forest of NAQ-trees
    Ming Zhang
    Keivan Kianmehr
    Reda Alhajj
    Journal of Intelligent Information Systems, 2011, 37 : 267 - 290