DATA-DRIVEN FIELD MAPPING OF SECURITY LOGS FOR INTEGRATED MONITORING

被引:0
作者
Choi, Seungoh [1 ]
Kim, Yesol [1 ]
Yun, Jeong-Han [1 ]
Min, Byung-Gil [1 ]
Kim, Hyoung-Chun [1 ]
机构
[1] Affiliated Inst ETRI, Daejeon, South Korea
来源
CRITICAL INFRASTRUCTURE PROTECTION XIII | 2019年 / 570卷
关键词
Security; event logs; integrated system monitoring;
D O I
10.1007/978-3-030-34647-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As industrial control system vulnerabilities and attacks increase, security controls must be applied to operational technologies. The growing demand for security threat monitoring and analysis techniques that integrate information from security logs has resulted in enterprise security management systems giving way to security information and event management systems. Nevertheless, it is vital to implement some form of pre-processing to collect, integrate and analyze security events efficiently. Operators still have to manually check entire security logs or write scripts or parsers that draw on domain knowledge, tasks that are time-consuming and error-prone. To address these challenges, this chapter focuses on the data-driven mapping of security logs to support the integrated monitoring of operational technology systems. The characteristics of security logs from security appliances used in critical infrastructure assets are analyzed to create a tool that maps different security logs to field categories to support integrated system monitoring. The tool reduces the effort needed by operators to manually process security logs even when the logged data generated by security appliances has new or modified formats.
引用
收藏
页码:253 / 268
页数:16
相关论文
共 50 条
  • [41] Data Auditing for Intelligent Network Security Monitoring
    Hong, SeukGue
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 74 - 79
  • [42] Code analysis for intelligent cyber systems: A data-driven approach
    Coulter, Rory
    Han, Qing-Long
    Pan, Lei
    Zhang, Jun
    Xiang, Yang
    INFORMATION SCIENCES, 2020, 524 (46-58) : 46 - 58
  • [43] Data-Driven Identification and Analysis of Waiting Times in Business Processes
    Ali, Muhammad Awais
    Milani, Fredrik
    Dumas, Marlon
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2025, 67 (02) : 191 - 208
  • [44] Sparse Actuator Attack Detection and Identification: A Data-Driven Approach
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Zhao, Yu
    Wang, Bohui
    Wen, Guanghui
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (06) : 4054 - 4064
  • [45] Data-Driven Edge Intelligence for Robust Network Anomaly Detection
    Xu, Shengjie
    Qian, Yi
    Hu, Rose Qingyang
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (03): : 1481 - 1492
  • [46] A data-driven approach improves food insecurity crisis prediction
    Lentz, E. C.
    Michelson, H.
    Baylis, K.
    Zhou, Y.
    WORLD DEVELOPMENT, 2019, 122 : 399 - 409
  • [47] Data-Driven Feature Characterization Techniques for Laser Printer Attribution
    Ferreira, Anselmo
    Bondi, Luca
    Baroffio, Luca
    Bestagini, Paolo
    Huang, Jiwu
    dos Santos, Jefersson A.
    Tubaro, Stefano
    Rocha, Anderson
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1860 - 1873
  • [48] Data-Driven Stochastic Unit Commitment for Integrating Wind Generation
    Zhao, Chaoyue
    Guan, Yongpei
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2016, 31 (04) : 2587 - 2596
  • [49] A Systematic Review of Data-Driven Attack Detection Trends in IoT
    Haque, Safwana
    El-Moussa, Fadi
    Komninos, Nikos
    Muttukrishnan, Rajarajan
    SENSORS, 2023, 23 (16)
  • [50] Data-driven Anomaly Detection with Timing Features for Embedded Systems
    Lu, Sixing
    Lysecky, Roman
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2019, 24 (03)