DATA-DRIVEN FIELD MAPPING OF SECURITY LOGS FOR INTEGRATED MONITORING

被引:0
|
作者
Choi, Seungoh [1 ]
Kim, Yesol [1 ]
Yun, Jeong-Han [1 ]
Min, Byung-Gil [1 ]
Kim, Hyoung-Chun [1 ]
机构
[1] Affiliated Inst ETRI, Daejeon, South Korea
来源
CRITICAL INFRASTRUCTURE PROTECTION XIII | 2019年 / 570卷
关键词
Security; event logs; integrated system monitoring;
D O I
10.1007/978-3-030-34647-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As industrial control system vulnerabilities and attacks increase, security controls must be applied to operational technologies. The growing demand for security threat monitoring and analysis techniques that integrate information from security logs has resulted in enterprise security management systems giving way to security information and event management systems. Nevertheless, it is vital to implement some form of pre-processing to collect, integrate and analyze security events efficiently. Operators still have to manually check entire security logs or write scripts or parsers that draw on domain knowledge, tasks that are time-consuming and error-prone. To address these challenges, this chapter focuses on the data-driven mapping of security logs to support the integrated monitoring of operational technology systems. The characteristics of security logs from security appliances used in critical infrastructure assets are analyzed to create a tool that maps different security logs to field categories to support integrated system monitoring. The tool reduces the effort needed by operators to manually process security logs even when the logged data generated by security appliances has new or modified formats.
引用
收藏
页码:253 / 268
页数:16
相关论文
共 50 条
  • [21] Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework
    Jiang, Yuchen
    Wu, Shimeng
    Yang, Hongyan
    Luo, Hao
    Chen, Zhiwen
    Yin, Shen
    Kaynak, Okyay
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (12): : 7799 - 7809
  • [22] Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System
    Buda, Michal
    Bluemke, Ilona
    DEPENDABILITY ENGINEERING AND COMPLEX SYSTEMS, 2016, 470 : 63 - 73
  • [23] IMPRES: Integrated monitoring for processor REliability and security
    Ragel, Roshan G.
    Parameswaran, Sri
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 502 - +
  • [24] Ethical Challenges in Data-Driven Dialogue Systems
    Henderson, Peter
    Sinha, Koustuv
    Angelard-Gontier, Nicolas
    Ke, Nan Rosemary
    Fried, Genevieve
    Lowe, Ryan
    Pineau, Joelle
    PROCEEDINGS OF THE 2018 AAAI/ACM CONFERENCE ON AI, ETHICS, AND SOCIETY (AIES'18), 2018, : 123 - 129
  • [25] Public Policy Considerations for Data-Driven Innovation
    Hemerly, Jess
    COMPUTER, 2013, 46 (06) : 25 - 31
  • [26] Data-driven Probabilistic Static Security Assessment for Power System Operation Using High-order Moments
    Wang, Guanzhong
    Li, Zhiyi
    Zhang, Feng
    Ju, Ping
    Wu, Hao
    Feng, Changsen
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2021, 9 (05) : 1233 - 1236
  • [27] TD(2)SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT
    Dejene, Dawit
    Tiwari, Basant
    Tiwari, Vivek
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2020, 6 (04): : 146 - 156
  • [28] Data-Driven Monitoring for Distributed Sensor Networks: An End-to-End Strategy Based on Collaborative Learning
    Chen, Fuyang
    He, Sudao
    Li, Yiwei
    Chen, Hongtian
    IEEE SENSORS JOURNAL, 2022, 22 (22) : 21795 - 21805
  • [29] Data Cleaning Technique for Security Logs Based on Fellegi-Sunter Theory
    Martinez-Mosquera, Diana
    Lujan-Mora, Sergio
    Lopez, Gabriel
    Santos, Lauro
    INFORMATION SYSTEMS: RESEARCH, DEVELOPMENT, APPLICATIONS, EDUCATION, 2017, 300 : 3 - 12
  • [30] A Data-Driven Scheme Based on Sparse Projection Oblique Randomer Forests for Real-Time Dynamic Security Assessment
    Lin, Yanfeng
    Wang, Xinyao
    IEEE ACCESS, 2022, 10 : 79469 - 79479