Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation

被引:0
作者
Sonmez, Ferda Ozdemir [1 ]
Gunel, Banu [1 ]
机构
[1] Middle East Tech Univ, Dept Informat Syst, Informat Inst, CyDeS Cyber Def & Secur Lab, Ankara, Turkey
来源
2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT) | 2018年
关键词
Security Information and Event Management; SIEM; Visualization; Splunk; AlienVault; Event Log Analyzer; Gartner; ArcSight; Rapid7;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 35 条
[31]   Exploratory Visualization Tool for the Continuous Evaluation of Information Retrieval Systems [J].
Gonzalez-Saez, Gabriela ;
Galuscakova, Petra ;
Deveaud, Romain ;
Goeuriot, Lorraine ;
Mulhem, Philippe .
PROCEEDINGS OF THE 46TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, SIGIR 2023, 2023, :3220-3224
[32]   Adversarial Evaluation of AI-Based Security Alert Screening Systems [J].
Ndichu, Samuel ;
Ban, Tao ;
Takahashi, Takeshi ;
Yamada, Akira ;
Ozawa, Seiichi ;
Inoue, Daisuke .
2024 IEEE CYBER SCIENCE AND TECHNOLOGY CONGRESS, CYBERSCITECH 2024, 2024, :115-124
[33]   Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment [J].
Hromada, Martin ;
Rehak, David ;
Skobiej, Bartosz ;
Bajer, Martin .
SMART CITIES, 2023, 6 (05) :2221-2244
[34]   Developing Security Information and Events Management Use Cases for 5G Specific Vulnerabilities and Attacks [J].
Banati, Anna .
ACTA POLYTECHNICA HUNGARICA, 2025, 22 (02) :123-147
[35]   Toward Intelligent Decision Support for Security Staff: Evaluation of an Interactive Resource Management System Based on a CMDP Model [J].
Hild, Jutta ;
Ott, Jonathan ;
Peinsipp-Byma, Elisabeth .
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE X, 2011, 8019