Enhancement of Internal Control by expanding Security Information Event Management System

2015 ◽  
Vol 20 (8) ◽  
pp. 35-43
Author(s):  
DongSung Im ◽  
Yongmin Kim
2019 ◽  
Vol 8 (4) ◽  
pp. 4475-4482

Nowadays, cybersecurity data management has become a challenging issue especially with the emergence of Big Data. This paper introduces the System of Systems (SoS) paradigm to design a new generation SIEM POC (Security Information Event Management Proof Of Concept) made up of an open source Big Data platform ELK and integrated with other open source security and load-balancing tools. To do this, we first focused on the Big Data and Smart Data requirements to model a data lifecycle from the literature named Smart DLC to the System of 7 Systems, So7S. Second, we used the proposed cycle as SoS tools design, implement and test the proposed SIEM POC by matching the cybersecurity tools to each system of the SoS modeled. The proposed open source SIEM is operational and meets all cybersecurity monitoring requirements with challenging results and may interest small and medium-sized companies dealing with cybersecurity issues


Author(s):  
Igor Vitalievich Kotenko ◽  
Igor Borisovich Parashchuk

The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators characterizing the essential properties of functioning the security information and events management system in the state space. The model is a system of equations of state and observation, traditional for the Markov chain in the form of finite differences. The scientific task is to improve (modify) the algorithms for converting excitation noise used in the model. A mechanism is proposed for determining the values of the mathematical expectation increment of the simulated process, obtained on the basis of a priori data on the Markov chain, in relation to the mathematical expectation of white Gaussian noise exciting this process. Based on simple calculations the mechanism helps to decide what values can be taken by the elements of the vector of compensation additives in the equation of state of the auxiliary indicator vector of this modified model, taking into account the conversion of the excitation noise. This allows simplifying the model and reducing its computational complexity without significant losses in accuracy (adequacy). The practical application of an improved model is possible both in the framework of the research and in the systems of automated control of information security.


Author(s):  
G Ravi Kumar, Et. al.

Security and Privacy protection have been a public approach worry for quite a long time. Notwithstanding, quick innovative changes, the fast development of the internet and electronic business, and the improvement of more modern techniques for gathering, investigating, and utilizing individual information have made privacy a significant public and government issues. The field of data mining is acquiring importance acknowledgment to the accessibility of a lot of data, effortlessly gathered and put away through PC systems. Data mining procedures, while permitting the people to remove shrouded information on one hand, present various privacy dangers then again. In this paper, we concentrate a portion of these issues alongside an itemized conversation on the utilizations of different data mining strategies for giving security. This paper gives an outline of data mining field and security information event management system. We will perceive how different data


2021 ◽  
pp. 108008
Author(s):  
Panagiotis Radoglou-Grammatikis ◽  
Panagiotis Sarigiannidis ◽  
Eider Iturbe ◽  
Erkuden Rios ◽  
Saturnino Martinez ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document