Efficient and Standardized Alarm Rationalization for Cybersecurity Monitoring

被引:0
作者
Alabdulhadi, Sarah [1 ]
Al-Matouq, Ali [1 ]
机构
[1] Prince Sultan Univ, Dept Engn Management, Riyadh 11586, Saudi Arabia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Penetration testing; Computer security; Monitoring; Security; Testing; Natural language processing; Semantics; Guidelines; Alarm systems; Intrusion detection; Cybersecurity; alarm rationalization; intrusion detection; alarm management; penetration testing; ARTIFICIAL-INTELLIGENCE;
D O I
10.1109/ACCESS.2024.3492264
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat monitoring in cybersecurity systems is often jeopardized by alarm flooding, which frequently occurs in Security Information and Event Management (SIEM) solutions due to the unnecessary annunciation of numerous logs and event data from a variety of sources, including applications, network devices, firewall logs, and other sources. Cybersecurity operators may become alert fatigued and less able to respond to important occurrences due to the high volume of unnecessary alarms. Hence, for security operators to monitor threats effectively and consistently, alarm rationalization using formal and efficient techniques is needed. This study proposes a new framework for efficiently prioritizing cybersecurity alarms based on the integration of penetration testing findings with well-established industrial standards in alarm management. This is efficiently done by developing a Natural Language Processing (NLP) model to automatically map penetration testing findings to the Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) relationships, followed by alarm rationalization based on the industrial alarm management standard ISA 18.2. Verification of the effectiveness of the new integrated approach is demonstrated on a real system, which showed a reduction in the number of critical and high alarms by 38% while conforming to industrial alarm management standards in terms of peak alarm rates, average alarm rates, and healthy alarm priority distribution.
引用
收藏
页码:166936 / 166944
页数:9
相关论文
共 20 条
  • [1] Alabdulhadi Sarah M., 2023, 2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), P37, DOI 10.1109/WiDS-PSU57071.2023.00020
  • [2] [Anonymous], 2023, IEC62682 Management of Alarm Systems for the Process Industries, document IEC 62682
  • [3] [Anonymous], 2013, eEMUA Publication, V191
  • [4] [Anonymous], 2016, API1167 Pipeline SCADA Alarm Management, V2nd
  • [5] [Anonymous], 2016, ANSI/ISA 18.2: Management of Alarm Systems for the Process Industries
  • [6] [Anonymous], 2019, Gas Well Blowout and Fire At Pryor Trust Well 1h-9
  • [7] Explainable Artificial Intelligence in CyberSecurity: A Survey
    Capuano, Nicola
    Fenza, Giuseppe
    Loia, Vincenzo
    Stanzione, Claudio
    [J]. IEEE ACCESS, 2022, 10 : 93575 - 93600
  • [8] Sequence Mining Based Alarm Suppression
    Dorgo, Gyula
    Bonyi, Janosa
    [J]. IEEE ACCESS, 2018, 6 : 15365 - 15379
  • [9] Hollifield B. R., 2011, Alarm Management:A Comprehensive Guide: Practical and Proven Methods to Optimize the Performance of Alarm Management Systems
  • [10] Hollifield B, 2016, CHEM ENG-NEW YORK, V123, P56