SIEM Selection Criteria for an efficient contextual security

被引:0
|
作者
Nabil, Moukafih [1 ]
Soukaina, Sabir [1 ]
Lakbabi, Abdelmajid [1 ]
Ghizlane, Orhanou [1 ]
机构
[1] Mohammed V Univ Rabat, Fac Sci, Lab Math Comp & Applicat, BP1014 RP, Rabat, Morocco
关键词
SIEM; SOC; Security; Selection Criteria;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IT environment is on a constant evolution and it's getting more complex. Therefore, organizations started to invest on integrating SOCs (Security Operation Center) to improve its security. Several studies have been carried out on this area of SOC analysis, its elaboration and the balance between the triad PPT (Person, Process and Technology). Our aim in this paper is to propose selection criteria that will help organizations analyzing different SOCs and perhaps chose the ideal one. In this context, we have implemented three SIEM tools and compared them through the proposed criteria, in order to demonstrate how much information these criteria can provide on each SIEM tool, and thus contributing in decision making for choosing the ideal SOC for a specific environment.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] SELECTION CRITERIA FOR EFFICIENT IMPLEMENTATION OF FFT ALGORITHMS - COMMENT
    BURRUS, CS
    IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1983, 31 (01): : 206 - 206
  • [22] Contextual Client Selection for Efficient Federated Learning Over Edge Devices
    Pan, Qiying
    Cao, Hangrui
    Zhu, Yifei
    Liu, Jiangchuan
    Li, Bo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (06) : 6538 - 6548
  • [23] Effects of SIEM Recovery Time: Case Study on Security Onion
    Hongkamnerd, Wararit
    Tangtrongpairoj, Withawat
    Watanapongse, Pirawat
    Sanguanpong, Surasak
    2024 21ST INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY, ECTI-CON 2024, 2024,
  • [24] Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles
    Stamou, Angelos
    Pantazopoulos, Panagiotis
    Haddad, Sammy
    Amditis, Angelos
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 234 - 240
  • [25] Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection
    Aladwan, Mohammad
    Awaysheh, Feras
    Cabaleiro, Jose
    Pena, Tomas
    Alabool, Hamzeh
    Alazab, Mamoun
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 814 - 820
  • [26] Fleet SIEM as a part of an integrated Automotive cyber Security Management System
    Dassow, Ingo
    Bensch, Richard
    AUTOMOTIVE SECURITY, 2017, 2017, 2310 : 39 - 52
  • [27] Deployment of Honeypot and SIEM Tools for Cyber Security Education Model in UITM
    Ariffin, Muhammad Azizi Mohd
    Darus, Mohamed Yusof
    Haron, Haryani
    Kurniawan, Aditya
    Muliono, Yohan
    Pardomuan, Chrisando Ryan
    International Journal of Emerging Technologies in Learning, 2022, 17 (20): : 149 - 172
  • [28] An efficient and simple model for multiple criteria supplier selection problem
    Ng, Wan Lung
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2008, 186 (03) : 1059 - 1067
  • [29] EFFICIENT FEATURE-SUBSET SELECTION WITH PROBABILISTIC DISTANCE CRITERIA
    CHITTINENI, CB
    INFORMATION SCIENCES, 1980, 22 (01) : 19 - 35
  • [30] An analytical derivation of the efficient surface in portfolio selection with three criteria
    Qi, Yue
    Steuer, Ralph E.
    Wimmer, Maximilian
    ANNALS OF OPERATIONS RESEARCH, 2017, 251 (1-2) : 161 - 177