DATA-DRIVEN FIELD MAPPING OF SECURITY LOGS FOR INTEGRATED MONITORING
被引:0
作者:
Choi, Seungoh
论文数: 0引用数: 0
h-index: 0
机构:
Affiliated Inst ETRI, Daejeon, South KoreaAffiliated Inst ETRI, Daejeon, South Korea
Choi, Seungoh
[1
]
Kim, Yesol
论文数: 0引用数: 0
h-index: 0
机构:
Affiliated Inst ETRI, Daejeon, South KoreaAffiliated Inst ETRI, Daejeon, South Korea
Kim, Yesol
[1
]
Yun, Jeong-Han
论文数: 0引用数: 0
h-index: 0
机构:
Affiliated Inst ETRI, Daejeon, South KoreaAffiliated Inst ETRI, Daejeon, South Korea
Yun, Jeong-Han
[1
]
Min, Byung-Gil
论文数: 0引用数: 0
h-index: 0
机构:
Affiliated Inst ETRI, Daejeon, South KoreaAffiliated Inst ETRI, Daejeon, South Korea
Min, Byung-Gil
[1
]
Kim, Hyoung-Chun
论文数: 0引用数: 0
h-index: 0
机构:
Affiliated Inst ETRI, Daejeon, South KoreaAffiliated Inst ETRI, Daejeon, South Korea
Kim, Hyoung-Chun
[1
]
机构:
[1] Affiliated Inst ETRI, Daejeon, South Korea
来源:
CRITICAL INFRASTRUCTURE PROTECTION XIII
|
2019年
/
570卷
关键词:
Security;
event logs;
integrated system monitoring;
D O I:
10.1007/978-3-030-34647-8_13
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
As industrial control system vulnerabilities and attacks increase, security controls must be applied to operational technologies. The growing demand for security threat monitoring and analysis techniques that integrate information from security logs has resulted in enterprise security management systems giving way to security information and event management systems. Nevertheless, it is vital to implement some form of pre-processing to collect, integrate and analyze security events efficiently. Operators still have to manually check entire security logs or write scripts or parsers that draw on domain knowledge, tasks that are time-consuming and error-prone. To address these challenges, this chapter focuses on the data-driven mapping of security logs to support the integrated monitoring of operational technology systems. The characteristics of security logs from security appliances used in critical infrastructure assets are analyzed to create a tool that maps different security logs to field categories to support integrated system monitoring. The tool reduces the effort needed by operators to manually process security logs even when the logged data generated by security appliances has new or modified formats.