Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation

被引:0
|
作者
Sonmez, Ferda Ozdemir [1 ]
Gunel, Banu [1 ]
机构
[1] Middle East Tech Univ, Dept Informat Syst, Informat Inst, CyDeS Cyber Def & Secur Lab, Ankara, Turkey
来源
2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT) | 2018年
关键词
Security Information and Event Management; SIEM; Visualization; Splunk; AlienVault; Event Log Analyzer; Gartner; ArcSight; Rapid7;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 50 条
  • [1] Analytical Visualization Techniques for Security Information and Event Management
    Novikova, Evgenia
    Kotenko, Igor
    PROCEEDINGS OF THE 2013 21ST EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2013, : 519 - 525
  • [2] The Operational Role of Security Information and Event Management Systems
    Bhatt, Sandeep
    Manadhata, Pratyusa K.
    Zomlot, Loai
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 35 - 41
  • [3] Visualization of information security management processes
    Miloslavskaya N.G.
    Tolstoy A.I.
    1600, National Research Nuclear University (09): : 117 - 136
  • [4] New types of Alert Correlation for Security Information and Event Management Systems
    Granadillo, Gustavo Gonzalez
    El-Barbori, Mohammed
    Debar, Herve
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [5] Information security management: The second generation
    vonSolms, R
    COMPUTERS & SECURITY, 1996, 15 (04) : 281 - 288
  • [6] Information security management: The second generation
    von Solms, Rossouw
    Computers and Security, 1996, 15 (04): : 281 - 288
  • [7] Visualization in Information Security
    Schweitzer, Dino
    Fulton, Steven
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 288 - 296
  • [8] Information visualization in information security management for enterprise's information infrastructure
    Miloslavskaya, N.
    Tolstoy, A.
    Birjukov, A.
    Scientific Visualization, 2014, 6 (02): : 74 - 91
  • [9] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [10] Information systems security metrics management
    Kovacich, G
    COMPUTERS & SECURITY, 1997, 16 (07) : 610 - 618