Architecture of Anomaly Detection Module for the Security Operations Center

被引:7
作者
Bienias, Piotr [1 ]
Kolaczek, Grzegorz [1 ]
Warzynski, Arkadiusz [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Comp Sci & Management, 27 Wybrzeze Wyspianskiego St, PL-50370 Wroclaw, Poland
来源
2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE) | 2019年
关键词
anomaly detection; Security Operation Center; intrusion detection;
D O I
10.1109/WETICE.2019.00035
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents the preliminary results of the research undertaken within RegSOC project. The goal of the project is initiate a prototype instance of the model Regional Center for Cybersecurity (RegSOC) and to facilitate to the public entities. The outcomes of this project will allow to raise levels of security protection and to present procedures, which can reduce the probability of unwanted events and methods of lowering their consequences. The project aims at developing a comprehensive cybersecurity monitoring platform which will be the software and organizational solution (management models and organizational procedures). The software part of the platform will constitute several modules specialized in various types of security level evaluation. The paper focuses on the module integrated with the RegSOC platform which will support security-related events detection by detecting anomalies. The architecture of the anomaly detection module has been introduced and the functional and non-functional requirements related to this module have been discussed. Also, the role and the way of integrating the module with the general RegSOC architecture has been demonstrated.
引用
收藏
页码:126 / 131
页数:6
相关论文
共 26 条
  • [1] ActiveWizards: data science and engineering lab, 2019, TOP 10 TECHN TRENDS
  • [2] [Anonymous], 2016, METRON ARCHITECTURE
  • [3] [Anonymous], 2009, P 2009 IEEE S COMP I
  • [4] [Anonymous], 2019, ANOMALY DETECTION AZ
  • [5] [Anonymous], 2007, THESIS QUEENS U KING
  • [6] [Anonymous], 2019, GET INSTANTANEOUS BE
  • [7] Balasaraswathi V. R., 2017, J COMMUN INF NETW, V2, P107, DOI DOI 10.1007/S41650-017-0033-7
  • [8] Network Anomaly Detection: Methods, Systems and Tools
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
  • [9] Chamiekara GWP, 2017, 2017 NATIONAL INFORMATION TECHNOLOGY CONFERENCE (NITC), P100, DOI 10.1109/NITC.2017.8285644
  • [10] Dijkhuizen N. V., 2018, J ACM COMPUTING SURV, V51