DATA-DRIVEN FIELD MAPPING OF SECURITY LOGS FOR INTEGRATED MONITORING

被引:0
|
作者
Choi, Seungoh [1 ]
Kim, Yesol [1 ]
Yun, Jeong-Han [1 ]
Min, Byung-Gil [1 ]
Kim, Hyoung-Chun [1 ]
机构
[1] Affiliated Inst ETRI, Daejeon, South Korea
来源
CRITICAL INFRASTRUCTURE PROTECTION XIII | 2019年 / 570卷
关键词
Security; event logs; integrated system monitoring;
D O I
10.1007/978-3-030-34647-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As industrial control system vulnerabilities and attacks increase, security controls must be applied to operational technologies. The growing demand for security threat monitoring and analysis techniques that integrate information from security logs has resulted in enterprise security management systems giving way to security information and event management systems. Nevertheless, it is vital to implement some form of pre-processing to collect, integrate and analyze security events efficiently. Operators still have to manually check entire security logs or write scripts or parsers that draw on domain knowledge, tasks that are time-consuming and error-prone. To address these challenges, this chapter focuses on the data-driven mapping of security logs to support the integrated monitoring of operational technology systems. The characteristics of security logs from security appliances used in critical infrastructure assets are analyzed to create a tool that maps different security logs to field categories to support integrated system monitoring. The tool reduces the effort needed by operators to manually process security logs even when the logged data generated by security appliances has new or modified formats.
引用
收藏
页码:253 / 268
页数:16
相关论文
共 50 条
  • [1] Security and Privacy for Smart Meters: A Data-Driven Mapping Study
    Antoniadis, Ioannis I.
    Chatzidimitriou, Kyriakos C.
    Symeonidis, Andreas L.
    PROCEEDINGS OF 2019 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT-EUROPE), 2019,
  • [2] Data-Driven Transient Stability Boundary Generation for Online Security Monitoring
    Yan, Rong
    Geng, Guangchao
    Jiang, Quanyuan
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (04) : 3042 - 3052
  • [3] A Data-Driven Security Risk Assessment Scheme for Personal Data Protection
    Cha, Shi-Cho
    Yeh, Kuo-Hui
    IEEE ACCESS, 2018, 6 : 50510 - 50517
  • [4] Attack and Defense: Adversarial Security of Data-Driven FDC Systems
    Zhuo, Yue
    Yin, Zhenqin
    Ge, Zhiqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 5 - 19
  • [5] Data-Driven Security for Smart City Systems: Carving a Trail
    Mohamed, Nader
    Al-Jaroodi, Jameela
    Jawhar, Imad
    Kesserwan, Nader
    IEEE ACCESS, 2020, 8 : 147211 - 147230
  • [6] A Data-Driven Evaluation of the Current Security State of Android Devices
    Leierzopf, Ernst
    Mayrhofer, Rene
    Roland, Michael
    Studier, Wolfgang
    Dean, Lawrence
    Seiffert, Martin
    Putz, Florentin
    Becker, Lucas
    Thomas, Daniel R.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [7] Data-Driven Process Discovery - Revealing Conditional Infrequent Behavior from Event Logs
    Mannhardt, Felix
    de Leoni, Massimiliano
    Reijers, Hajo A.
    van der Aalst, Wil M. P.
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2017), 2017, 10253 : 545 - 560
  • [8] Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis
    Zhang, Fengli
    Li, Qinghua
    PROCEEDINGS OF THE FIRST WORKSHOP ON RADICAL AND EXPERIENTIAL SECURITY (RESEC'18), 2018, : 65 - 68
  • [9] Mapping smart farming: Addressing agricultural challenges in data-driven era
    Huo, Dongyang
    Malik, Asad Waqar
    Ravana, Sri Devi
    Rahman, Anis Ur
    Ahmedy, Ismail
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2024, 189
  • [10] Database Generation for Data-Driven Power System Security Assessment Under Uncertainty
    Xia, Tian
    Hou, Qingchun
    Zhang, Ning
    Dong, Qihuan
    Li, Weiran
    Kang, Chongqing
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (05) : 6168 - 6182