Architecture of Anomaly Detection Module for the Security Operations Center

被引:7
|
作者
Bienias, Piotr [1 ]
Kolaczek, Grzegorz [1 ]
Warzynski, Arkadiusz [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Comp Sci & Management, 27 Wybrzeze Wyspianskiego St, PL-50370 Wroclaw, Poland
关键词
anomaly detection; Security Operation Center; intrusion detection;
D O I
10.1109/WETICE.2019.00035
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents the preliminary results of the research undertaken within RegSOC project. The goal of the project is initiate a prototype instance of the model Regional Center for Cybersecurity (RegSOC) and to facilitate to the public entities. The outcomes of this project will allow to raise levels of security protection and to present procedures, which can reduce the probability of unwanted events and methods of lowering their consequences. The project aims at developing a comprehensive cybersecurity monitoring platform which will be the software and organizational solution (management models and organizational procedures). The software part of the platform will constitute several modules specialized in various types of security level evaluation. The paper focuses on the module integrated with the RegSOC platform which will support security-related events detection by detecting anomalies. The architecture of the anomaly detection module has been introduced and the functional and non-functional requirements related to this module have been discussed. Also, the role and the way of integrating the module with the general RegSOC architecture has been demonstrated.
引用
收藏
页码:126 / 131
页数:6
相关论文
共 50 条
  • [21] Improved Autoencoder Model With Memory Module for Anomaly Detection
    Huang, Wei
    Liu, Zhen
    Jin, Xiaohang
    Xu, Jinshan
    Yao, Xinwei
    IEEE SENSORS JOURNAL, 2024, 24 (08) : 12770 - 12781
  • [22] Integrated Anomaly Detection for Cyber Security of the Substations
    Hong, Junho
    Liu, Chen-Ching
    Govindarasu, Manimaran
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (04) : 1643 - 1653
  • [23] Security Analysis of Online Centroid Anomaly Detection
    Kloft, Marius
    Laskov, Pavel
    JOURNAL OF MACHINE LEARNING RESEARCH, 2012, 13 : 3681 - 3724
  • [24] Anomaly detection with high deviations for system security
    Peng, XG
    Ren, KF
    11TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2005, : 200 - 207
  • [25] Anomaly Detection for Big Data Security: A Benchmark
    Es-Samaali, Hamza H.
    Outchakoucht, Aissam A.
    Benhadou, Siham S.
    Mounnan, Oussama O.
    Abou El Kalam, Anas A.
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING AND TECHNOLOGY, BDET 2021, 2021, : 35 - 39
  • [26] Anomaly Detection Models for Smart Home Security
    Ramapatruni, Sowmya
    Narayanan, Sandeep Nair
    Mittal, Sudip
    Joshi, Anupam
    Joshi, Karuna
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 19 - 24
  • [27] Security protocols protection based on anomaly detection
    Alharby, A
    Imai, H
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (01): : 189 - 200
  • [28] System and Network Security: Anomaly Detection and Monitoring
    Vadursi, Michele
    Ceccarelli, Andrea
    Duarte, Elias P., Jr.
    Mahanti, Aniket
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)
  • [29] Integrated Anomaly Detection for Cyber Security of the Substations
    Hong, Junho
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [30] Security Management Architecture for Secure Smartwork Center
    Byun, Yun sang
    Kwak, Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 315 - 320