Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation

被引:0
作者
Sonmez, Ferda Ozdemir [1 ]
Gunel, Banu [1 ]
机构
[1] Middle East Tech Univ, Dept Informat Syst, Informat Inst, CyDeS Cyber Def & Secur Lab, Ankara, Turkey
来源
2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT) | 2018年
关键词
Security Information and Event Management; SIEM; Visualization; Splunk; AlienVault; Event Log Analyzer; Gartner; ArcSight; Rapid7;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 35 条
[21]   A Comparative Study of Correlation Engines for Security Event Management [J].
Rosa, Luis ;
Alves, Pedro ;
Cruz, Tiago ;
Simoes, Paulo ;
Monteiro, Edmundo .
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, :277-285
[22]   A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies [J].
Ahlers, Volker ;
Hellmann, Bastian ;
Rodosek, Gabi Dreo .
PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, :668-673
[23]   A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM) [J].
AlSabbagh, Bilal ;
Kowalski, Stewart .
2016 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2016, :192-195
[24]   In the eye of the beholder: A visualization-based approach to information system security [J].
de Paula, R ;
Ding, XH ;
Dourish, P ;
Nies, K ;
Pillet, B ;
Redmiles, DF ;
Ren, H ;
Rode, JA ;
Silva, R .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) :5-24
[25]   Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information and Event Management [J].
Panigrahi, Gyana Ranjana ;
Sethy, Prabira Kumar ;
Behera, Santi Kumari ;
Gupta, Manoj ;
Alenizi, Farhan A. ;
Suanpang, Pannee ;
Nanthaamornphong, Aziz .
IEEE ACCESS, 2024, 12 :83043-83056
[26]   A framework for mastering heterogeneity in multi-layer security information and event correlation [J].
Coppolino, Luigi ;
D'Antonio, Salvatore ;
Formicola, Valerio ;
Romano, Luigi .
JOURNAL OF SYSTEMS ARCHITECTURE, 2016, 62 :78-88
[27]   IoTBlockSIEM for information security incident management in the internet of things ecosystem [J].
Miloslavskaya, Natalia ;
Tolstoy, Alexander .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03) :1911-1925
[28]   IoTBlockSIEM for information security incident management in the internet of things ecosystem [J].
Natalia Miloslavskaya ;
Alexander Tolstoy .
Cluster Computing, 2020, 23 :1911-1925
[29]   Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs [J].
Gallego-Nicasio Crespo, Beatriz ;
Garwood, Alan .
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, :192-198
[30]   Common Framework for Attack Modeling and Security Evaluation in SIEM Systems [J].
Kotenko, Igor ;
Chechulin, Andrey .
2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, :94-101