2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2017
DOI: 10.1109/wispnet.2017.8299855
|View full text |Cite
|
Sign up to set email alerts
|

Profiling SIEM tools and correlation engines for security analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 4 publications
0
17
0
2
Order By: Relevance
“…Elastic stack es una Plataforma de código abierto para la ingesta confinable de dates de different fonts, in a variety of different formats; that allows to search, analyse and visualize data in real time [10]. It is used to create big data solutions, it is composed of: Elasticsearch (ES), Logstash and Kibana [29]. It is known as an open source search and analytics engine, based on Apache Lucene, considered as a full-text, distributed and multi-tenancy search engine with a RESTful web interface (Based on REST architecture, which is an interface to connect several HTTP-based systems, and serves to obtain and generate data and operations) and with JSON documents, designed to enable scale-out, reliability and easy management [30].…”
Section: Elastic Stack Componentsmentioning
confidence: 99%
“…Elastic stack es una Plataforma de código abierto para la ingesta confinable de dates de different fonts, in a variety of different formats; that allows to search, analyse and visualize data in real time [10]. It is used to create big data solutions, it is composed of: Elasticsearch (ES), Logstash and Kibana [29]. It is known as an open source search and analytics engine, based on Apache Lucene, considered as a full-text, distributed and multi-tenancy search engine with a RESTful web interface (Based on REST architecture, which is an interface to connect several HTTP-based systems, and serves to obtain and generate data and operations) and with JSON documents, designed to enable scale-out, reliability and easy management [30].…”
Section: Elastic Stack Componentsmentioning
confidence: 99%
“…They investigate strategies for preprocessing alarm events in order to reduce the number of displayed alarms, thus simplifying the system for human operators. An overview of the most popular SIEM tools and open-source rule-based correlation engines (including IBM QRadar, HP ArcSight, Splunk, and LogRhythm) was presented in [23], which compared the engine correlation mechanisms and classified them into similaritybased, knowledge-based, and statistical correlation. The authors of [24] proposed two novel alert correlation approaches for SIEM systems: enforcement-based correlation, which aims at classifying all possible countermeasures and their associated policy enforcement points to implement the security rule as a defense mechanism; metric-based correlation, which aims at deriving correlation rules from information security indicators to allow the analysis and evaluation of the SIEM effectiveness.…”
Section: State-of-the-art On Siemmentioning
confidence: 99%
“…However, it does not solve the tampering problem, as all logging data is stored in the same place, without a way to verify if someone modified an entry. Alternative common log management tools, like LogRhytm [8] or Splunk [9], have the same problem. Their main concern is storing data and retrieving entries quickly and efficiently, without analysing possible integrity problems.…”
Section: Related Workmentioning
confidence: 99%