Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation

被引:0
作者
Sonmez, Ferda Ozdemir [1 ]
Gunel, Banu [1 ]
机构
[1] Middle East Tech Univ, Dept Informat Syst, Informat Inst, CyDeS Cyber Def & Secur Lab, Ankara, Turkey
来源
2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT) | 2018年
关键词
Security Information and Event Management; SIEM; Visualization; Splunk; AlienVault; Event Log Analyzer; Gartner; ArcSight; Rapid7;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 33 条
  • [21] A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies
    Ahlers, Volker
    Hellmann, Bastian
    Rodosek, Gabi Dreo
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 668 - 673
  • [22] A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM)
    AlSabbagh, Bilal
    Kowalski, Stewart
    2016 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2016, : 192 - 195
  • [23] In the eye of the beholder: A visualization-based approach to information system security
    de Paula, R
    Ding, XH
    Dourish, P
    Nies, K
    Pillet, B
    Redmiles, DF
    Ren, H
    Rode, JA
    Silva, R
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 5 - 24
  • [24] Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information and Event Management
    Panigrahi, Gyana Ranjana
    Sethy, Prabira Kumar
    Behera, Santi Kumari
    Gupta, Manoj
    Alenizi, Farhan A.
    Suanpang, Pannee
    Nanthaamornphong, Aziz
    IEEE ACCESS, 2024, 12 : 83043 - 83056
  • [25] A framework for mastering heterogeneity in multi-layer security information and event correlation
    Coppolino, Luigi
    D'Antonio, Salvatore
    Formicola, Valerio
    Romano, Luigi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2016, 62 : 78 - 88
  • [26] IoTBlockSIEM for information security incident management in the internet of things ecosystem
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 1911 - 1925
  • [27] IoTBlockSIEM for information security incident management in the internet of things ecosystem
    Natalia Miloslavskaya
    Alexander Tolstoy
    Cluster Computing, 2020, 23 : 1911 - 1925
  • [28] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [29] Common Framework for Attack Modeling and Security Evaluation in SIEM Systems
    Kotenko, Igor
    Chechulin, Andrey
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 94 - 101
  • [30] Exploratory Visualization Tool for the Continuous Evaluation of Information Retrieval Systems
    Gonzalez-Saez, Gabriela
    Galuscakova, Petra
    Deveaud, Romain
    Goeuriot, Lorraine
    Mulhem, Philippe
    PROCEEDINGS OF THE 46TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, SIGIR 2023, 2023, : 3220 - 3224