Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
Abstract
:1. Introduction
2. SIEM Solutions
2.1. SIEM Classification
2.2. SIEM Tools
3. SIEM Features and Capabilities
4. Limitations of Current SIEMs
4.1. Incomplete Data
4.2. Basic Correlation Rules
4.3. Basic Storage Capabilities
4.4. Reliance on Humans
4.5. Basic Reaction and Reporting Capabilities
4.6. Limited Data Visualization
5. The Future of SIEMs
5.1. Political Factors
5.2. Economic Factors
- Short term/temporary work. In 2014 the main type of employment relationship in the EU was full-time permanent contracts, with 59% of the share of employment, although this is decreasing while the share of non-standard forms of work is increasing. If this trend continues, it may well become the case that standard contracts will only apply to a minority of workers within the next decade [95]. Due to the new types of work, tending to shorter term jobs, people do not stay in the same company for a long time, especially in the first period of their career. The consequence is that companies need to minimize the employee’s ramp up to learn a new tool, or a new way of working. Therefore, this factor makes it essential that future SIEMs have improved and more friendly interfaces at the level of decision taking, configuration rules, links to new sources, and sensors.
- Freelance. Self-employment is increasing against the usual company paid employment [96]. Freelancers do not work for a company as an employee but as a service provider. This type of work may be a threat for companies because the devices used by freelancers do not belong to the IT department and cannot be easily monitored. Furthermore, they do not have strong bonds with the company that hires their services. However, freelance cybersecurity consultants can be a good choice for SIEM providers because they may possess a wider knowledge about potential threats affecting an organization, since they accumulate a lot of experience from different companies.
- Cyber security jobs are continuously growing. The estimated growth in cybersecurity jobs is of 35% by 2020 [97]. This reflects the importance of cybersecurity for the companies, and that can be an opportunity for SIEMs to grow in the market.
- Bigger companies, globalization. The global market makes it easier for big technological companies to survive and grow more [98]. However, the level of criticality of that information may be higher. Future SIEMs should be dimensioned for such big companies and global networks.
- Small and medium sized enterprises. SMEs will become bigger targets of cyber-attacks in the future [99]. They should be the new target for SIEM market growth, making models like SIEM as a service more attractive to SMEs.
5.3. Societal Factors
- Generation Z. Modern generations understand the world as a big network in which everything is connected to the internet. It can be assumed that people of the future will be more aware of cybersecurity and will bring companies clearer awareness of the risks associated to threats in the network [100].
- Growth of social networks. There is a huge growth of social networks usage among the young generations in the last few years. Social network activity is a source of data that should not be disregarded, and it can be of very high importance in security events analysis [101].
- Cyber-attacks. In the new connected societies, the development of the internet has led to a new type of attacks, i.e., cyber-attacks. Attacks to critical infrastructures can be considered the new weapons, which makes SIEMs essential in any infrastructure in which data is of relevance or whose attack may cause operation disruption, even damage to population, not only from a single company’s perspective but also from users, citizens, and (more generally) people’s perspective [102].
- Deep web. The deep web is the part of the World Wide Web whose contents are not indexed by standard search engines [103]. This can be considered as a barrier by SIEM systems, since it makes it difficult to retrieve data from the network.
5.4. Technological Factors
- Cloud storage. This technology can be clearly seen as an enabler in SIEM technology since big data analytics of network events can be performed in a more efficient way, without worries about the amount of logs, information, etc., that are stored.
- Cloud service integration. This is treated separately to cloud storage because it is more focused on executing software in a remote server, and not only keeping data “statically” in a cloud infrastructure. This technology makes it possible to ensure scalability and high availability of software applications since they are not restricted to the hardware of a local server, and can be launched from anywhere.
- Mobile technologies. The growth of mobile devices brings new threats that should be analyzed by SIEM systems. In this respect, it is a trend that employees use company-owned devices as well as personal devices for office work. A need would be to secure corporate data. Working at home, e.g., with a personal computer, what now is commonly called BYOD (Bring Your Own Device), is a trend in cybersecurity [104]. However, this leads to several potential problems: BYOD devices are not managed by the IT team so they are not under the policy control of the company; some BYODs do not have any security solution pre-installed; data in these devices is not encrypted; applications installed in those devices cannot be tracked.
- Big data analytics. As introduced before, SIEMs are evolving to data analytics systems. Data in a connected environment grows exponentially and makes it necessary to have powerful analysis tools capable of real time analysis of events, support to decision making, etc. The growth in data analytics methods is clearly an enabler for SIEM systems.
- Machine learning technologies. New high performance computers, with powerful hardware and modern programmatic languages, together with the data analytics explained above, are making it possible to create data models fed by the experience of cause-effect analysis. SIEMs can take advantage of these technologies to make event detection and decision making smarter [105].
- Internet of Everything. The Internet of Everything (IoE) [106] is a ubiquitous communication network that effectively captures, manages and leverages data from billions of real-life objects and physical activities. It extends the concept of Internet of Things (IoT) by also including people, processes, locations, and more. The impact of this technology on SIEMs is that they provide large amount of data and events for analysis.
- 5G Networks. 5G represents the next generation of communication networks and services, an approach for fulfilling the requirements of future applications and scenarios. This technology will increase the data transfer speed, and then could affect the amount of data analyzed by a SIEM in a network per time unit. This can impose a difficulty for SIEMs in events detection.
- Social media analytics. Social networks like Twitter provide a wealth of information that may be explored by cybersecurity companies as well as by hackers, as attack victims use on-line social media to discuss their experience and knowledge about attacks, vulnerabilities, and exploits.
5.5. Legal Factors
5.6. Environmental Factors
6. Potential Enhancements of Future SIEMs
6.1. Diverse Security
6.2. OSINT Data Fusion
6.3. Enhanced Visualisation
- Design and develop a rich set of specialized visualization models that handle diverse types of data e.g., high-dimensional, temporal, textual, relational, spatial.
- Provide effective overviews, interactive capabilities to focus on details, and mechanisms to compare individual and/or groups of data instances.
- Design and develop visualization models capable of handling the dynamic nature of the data (e.g., streaming system activity logs, OSINT data, etc.) to support real-time analysis and decision-making.
- Develop a visual summary of user activities that reveals common/abnormal patterns in a large set of user sessions, compares multiple sessions of interest, and investigates in depth of individual sessions.
6.4. Enhanced Storage
6.5. Integration with Security Orchestration Automation and Response (SOAR)
6.6. AI/ML Capabilities
6.7. Other Potential Enhancements
7. SIEMs in Critical Infrastructures
7.1. Energy Distribution
7.2. Water Supply
7.3. Transportation
7.4. Healthcare
7.5. Financial Services
8. Related Work
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- WaterISAC. 15 Cybersecurity Fundamentals for Water and Wastewater Utilities. Best Practices to reduce Exploitable Weaknesses and Attacks. Available online: https://www.waterisac.org/system/files/articles/15%20Cybersecurity%20Fundamentals%20%28WaterISAC%29.pdf (accessed on 14 December 2020).
- CyberX. NIST Recommendations for IoT & ICS Security. An Executive Summary. White Paper. Available online: https://cyberx-labs.com/resources/nist-recommendations-for-iot-ics-security/ (accessed on 10 November 2020).
- Miller, D.; Harris, S.; Harper, A.; Van Dyke, S.; Blask, C. Security Information and Event Management (SIEM) Implementation; Mc Graw Hill: New York, NY, USA, 2010. [Google Scholar]
- Granadillo, G.G.; El-Barbori, M.; Debar, H. New types of Alert Correlation for Security Information and Event Management Systems. In Proceedings of the 8th International Conference on New Technologies, Mobility and Security, NTMS, Larnaca, Cyprus, 21–23 November 2016. [Google Scholar]
- Bryant, B.D.; Saiedian, H. Improving SIEM alert metadata aggregation with a novel kill-chain based classification model. Comput. Secur. 2020, 94. [Google Scholar] [CrossRef]
- Nicolett, M.; Kavanagh, K.M. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: http://docplayer.net/2407833-Magic-quadrant-for-security-information-and-event-management.html (accessed on 10 November 2020).
- Nicolett, M.; Kavanagh, K.M. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.novell.com/docrep/documents/yuufbom4u2/gartner_magic_quadrant_siem_report_may2011.pdf (accessed on 12 November 2020).
- Nicolett, M.; Kavanagh, K.M. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.bankinfosecurity.com/whitepapers/2012-gartner-magic-quadrant-for-siem-w-602 (accessed on 12 November 2020).
- Nicolett, M.; Kavanagh, K.M. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.gartner.com/en/documents/2477018/magic-quadrant-for-security-information-and-event-manage (accessed on 25 November 2020).
- Nicolett, M.; Kavanagh, K.M.; Rochford, O. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.bwdigitronik.ch/application/files/5814/5450/7565/www.gartner.com.com.pdf (accessed on 25 November 2020).
- Kavanagh, K.M.; Rochford, O. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.gartner.com/en/documents/3097022/magic-quadrant-for-security-information-and-event-manage (accessed on 10 November 2020).
- Kavanagh, K.M.; Rochford, O.; Bussa, T. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://securelink.net/wp-content/uploads/sites/7/2016-Magic-Quadrant-for-SIEM.pdf (accessed on 10 November 2020).
- Kavanagh, K.M.; Bussa, T. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.gartner.com/en/documents/3834683/magic-quadrant-for-security-information-and-event-manage (accessed on 12 November 2020).
- Kavanagh, K.M.; Sadowski, T.B.G. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://virtualizationandstorage.files.wordpress.com/2018/03/magic-quadrant-for-security-information-and-event-3-dec-2018.pdf (accessed on 10 November 2020).
- Kavanagh, K.M.; Sadowski, T.B.G. Magic Quadrant for Security Information and Event Management, Gartner Technical Report. Available online: https://www.gartner.com/en/documents/3981040/magic-quadrant-for-security-information-and-event-manage (accessed on 25 November 2020).
- Scarfone, K. Comparing the Best SIEM Systems on the Market. Online Research. Available online: http://searchsecurity.techtarget.com/feature/Comparing-the-best-SIEM-systems-on-the-market (accessed on 27 May 2020).
- Nirvana, I. SIEM Product Comparison-2016. Available online: http://infosecnirvana.com/siem-product-comparison-201/ (accessed on 14 December 2020).
- Rochford, O.; Kavanagh, K.M.; Bussa, T. Critical Capabilities for Security Information and Event Management; Technical Report; Gartner: Stamford, CT, USA, 2016. [Google Scholar]
- DiSIEM; Galan-Corroto, I.; Robla, E.; Prieto-Perez, S.; Gonzalez-Zarzosa, A.; Bessani, A.; Respicio, J.; Alves, L.; Ferreira, A.; Serckumecka, P.; et al. Turkay: In-Depth Analysis of SIEMs Extensibility; DiSIEM Technical Report D2.1; DiSIEM Project: Lisbon, Portugal, 2017. [Google Scholar]
- Gartner. 7 Macro Factors That Will Shape the 2020s. Official Website. Available online: https://www.gartner.com/en (accessed on 31 May 2021).
- TechTarget; SearchSecurity. How to Define SIEM Strategy, Management and Success in the Enterprise; Electronic Guide; TechTarget: Newton, MA, USA, 2014. [Google Scholar]
- Solutions Review. Security Information and Event Management Vendor Map. Available online: https://solutionsreview.com/security-information-event-management/security-information-event-management-vendor-map/ (accessed on 14 December 2020).
- Splunk. 7 SIEM Trends to Watch in 2019. Report. Available online: http://www.locuz.com/in/wp-content/uploads/2018/01/7-siem-trends-to-watch-in-2019.pdf (accessed on 12 January 2021).
- Scarfone, K. Hewlett Packard Enterprise’s ArcSight ESM: SIEM Product Overview. Technical Report. Available online: https://searchsecurity.techtarget.com/feature/Hewlett-Packard-Enterprises-ArcSight-ESM-SIEM-product-overview (accessed on 29 March 2021).
- RSA. SIEM—Security Information and Event Management. Official Website. Available online: https://www.rsa.com/en-us/products/threat-detection-response/siem-security-information-event-management (accessed on 7 June 2021).
- CISION. SenSage Continues Success Solving Big SIEM Challenges. Available online: https://www.prnewswire.com/news-releases/sensage-continues-success-solving-big-siem-challenges-123216948.html (accessed on 31 May 2021).
- TIBCO. Augment your SIEM Deployment with TIBCO LogLogic. Product Information. Available online: https://enlyft.com/tech/products/symantec-security-information-manager (accessed on 12 January 2021).
- ENLYFT. Symantec Security Information Manager. White Paper. Available online: https://www.tibco.com/resources/whitepaper/augment-your-siem-deployment-tibco-loglogic (accessed on 31 May 2021).
- IBM. IBM to Acquire Q1 Labs to Drive Greater Security Intelligence. Available online: https://www-03.ibm.com/press/us/en/pressrelease/35544.wss (accessed on 9 April 2021).
- NOVELL. Novell Sentinel Log Manager: Secure, Simple and Powerful Log Management. Technical White Paper. Available online: http://www.ingrammicro.com/healthcare/Novell_Sentinel_Log_Manager_Secure.pdf (accessed on 26 June 2020).
- IBM Security. IBM QRadar SIEM. White Paper. Available online: https://www.ibm.com/downloads/cas/RLXJNX2G (accessed on 12 December 2020).
- Quest. SIEM Integration Best Practices: Making the Most of Your Security Event Logs. White Paper. Available online: https://www.quest.com/whitepaper/siem-integration-best-practices8139415/ (accessed on 31 May 2021).
- CA. CA Enterprise Log Manager. Administration Guide. Available online: https://ftpdocs.broadcom.com/cadocs/0/CA%20Enterprise%20Log%20Manager%20r12%201%20SP3-ENU/Bookshelf_Files/PDF/CAELM_Admin_ENU.pdf (accessed on 31 May 2021).
- Tenable. Tenable Network Security Reveals the Next Generation of Its SIEM Solution. Available online: https://fr.tenable.com/press-releases/tenable-network-security-reveals-the-next-generation-of-its-siem-solution?tns_redirect=true (accessed on 7 June 2021).
- Netsurion. Prism Microsystems Unveils the Latest Version of Its SIEM Solution EventTracker v7.2. Available online: https://www.netsurion.com/news/prism-microsystems-unveils-the-latest-version-of-its-siem-solution-eventtracker-v7-2 (accessed on 25 November 2020).
- LogMatrix. NerveCenter for Automation and Event Correlation. Available online: http://logmatrix.com/nervecenter-unique-automation-analysis-and-correlation-applications/ (accessed on 12 January 2021).
- MicroFocus. NetIQ Sentinel. Available online: https://www.microfocus.com/en-us/products/netiq-sentinel/overview (accessed on 7 June 2021).
- McAfee. Security Information and Event Management (SIEM). Official Website. Available online: https://www.mcafee.com/enterprise/en-us/products/siem-products.html (accessed on 12 February 2021).
- Trustwave. SIEM Enterprise. Product Brief. Available online: https://trustwave.azureedge.net/media/13581/tw-siem-enterprise.pdf?rnd=131659475410000000 (accessed on 12 February 2011).
- LogRhythm. Security Information and Event Management (SIEM). Available online: https://logrhythm.com/solutions/security/siem/ (accessed on 31 May 2021).
- TriGeo. TriGeo Security Information Manager (SIM). Product Information. Available online: https://www.scmagazine.com/review/trigeo-security-information-manager-sim/ (accessed on 29 June 2020).
- Godfrey, M. netForensics—A Security Information Management Solution. White Paper. Available online: https://www.sans.org/reading-room/whitepapers/tools/netforensics-security-information-management-solution-408 (accessed on 14 December 2020).
- Moore, J. EiQ Networks Offers Managed SIEM for Cloud Channel Partners. Available online: https://searchitchannel.techtarget.com/news/450304496/EiQ-Networks-offers-managed-SIEM-for-cloud-channel-partners (accessed on 29 March 2021).
- Splunk. Compare Splunk Security Analytics vs. Traditional SIEM. Available online: https://www.splunk.com/en_us/resources/videos/splunk-for-security-vs-siem.html (accessed on 31 May 2021).
- PRWIRE. Tripwire Introduces Next Generation Security Information and Event Management (SIEM) Solution with Tripwire Log Center. Available online: https://prwire.com.au/pr/16314/tripwire-introduces-next-generation-security-information-and-event-management-siem-solution-with-tripwire-log-center (accessed on 14 December 2020).
- AT&T Cybersecurity. AlienVault OSSIM: The World’s Most Widely Used Open Source SIEM. Available online: https://cybersecurity.att.com/products/ossim (accessed on 12 January 2021).
- CorreLog. The CorreLog Approach to SIEM: Cross-Platform Event Log Management and Correlation. Available online: https://www.draware.dk/files/docs/users/Line/correlog-siem-server-brochure.pdf (accessed on 7 June 2021).
- S21SEC. Managed Intelligent SOC and SOC-as-a-Service. Available online: https://www.s21sec.com/managed-soc-siem-as-a-service/ (accessed on 31 May 2021).
- Help Systems. Powertech Event Manager. Security Information and Event Management (SIEM) Software. Available online: https://www.helpsystems.com/products/siem-software (accessed on 12 January 2021).
- Huntsman. Next Gen SIEM. Product Details. Available online: https://www.huntsmansecurity.com/resource/product-brochures/next-gen-siem/ (accessed on 13 January 2021).
- Solarwinds. Security Event Manager. Official Website. Available online: https://www.solarwinds.com/security-event-manager (accessed on 31 May 2021).
- TIBCO. Augment Your SIEM Deployment with TIBCO LogLogic. White Paper. Available online: https://www.tibco.com/sites/tibco/files/resources/wp-siem-final.pdf (accessed on 8 June 2021).
- EventTracker. SIEM Simplified. White Paper. Available online: https://www.eventtracker.com/EventTracker/media/EventTracker/Files/whitepapers/WP-SIEM-Simplified.pdf (accessed on 29 March 2021).
- Fortinet. FortiSIEM Powerful Security Information and Event Management (SIEM) with User and Entity Behavior Analytics (UEBA). Official Website. Available online: https://www.fortinet.com/products/siem/fortisiem (accessed on 29 March 2021).
- Pereira, P. SIEM Security: As Secure as It SIEMs. Available online: https://www.blackstratus.com/siem-security-solutions/ (accessed on 12 January 2021).
- ManageEngine. Event Log Analyzer. Official Website. Available online: https://www.manageengine.com/products/eventlog/?pos=MEtab&cat=ITS&loc=tab&prev=AB2 (accessed on 31 May 2021).
- FIREEYE. SIEM Security Solution. Next-Generation Detection, Analytics and Response. Official Website. Available online: https://www.fireeye.com/products/helix/siem.html (accessed on 31 May 2021).
- Venustech. USM. Product Details. Available online: https://www.venusense.com/type/USM/ (accessed on 8 June 2021).
- RAPID7. InsightIDR. Product Details. Available online: https://www.rapid7.com/products/insightidr/ (accessed on 8 June 2021).
- EXABEAM. The Exabeam Security Management Platform. Product Details. Available online: https://www.exabeam.com/product/ (accessed on 31 May 2021).
- SECURONIX. Next-Gen Security Information and Event Management (SIEM). Product Details. Available online: https://www.securonix.com/products/next-generation-siem/ (accessed on 13 January 2021).
- LOGPOINT. Redefining SIEM and UEBA. Product Details. Available online: https://www.logpoint.com/en/ (accessed on 13 January 2021).
- HanSight. Unified Security Analytics Platform. Product Details. Available online: http://en.hansight.com/product/enterprise (accessed on 29 March 2021).
- Aymard, M. Security Monitoring System Applied to IoT. Master’s Thesis, Universidad Politécnica de Madrid, Madrid, Spain, 2019. Available online: http://oa.upm.es/65634/1/TESIS_MASTER_MARIANNE_AYMARD_CUELLO.pdf (accessed on 31 May 2021).
- Infosys. The Future of Tomorrow: Automation for Cybersecurity. Technical Paper. Available online: https://www.infosys.com/about/knowledge-institute/insights/documents/future-tomorrow.pdf (accessed on 14 December 2020).
- Pritz, A. Security Analytics for Dummies, Securonix Special Edition. Available online: https://www.securonix.com/web/wp-content/uploads/2018/08/Security_Analytics_For_Dummies_Securonix_Special_Edition.pdf (accessed on 8 June 2021).
- Petters, J. What is SIEM? A Beginner’s Guide. Aronis White Paper. Available online: https://www.varonis.com/blog/what-is-siem/ (accessed on 29 March 2021).
- Caccia, R.; Cassetto, O.; Shteiman, B. The Future of SIEM, International Information Systems Security Certification Consortium (ISC2). Webminar. Available online: https://www.brighttalk.com/ (accessed on 30 March 2021).
- Council of the European Union. General Data Protection Regulation. Available online: http://data.consilium.europa.eu/doc/document/ST-9565-2015-INIT/en/pdf (accessed on 10 October 2020).
- Menges, F.; Latzo, T.; Vielberth, M.; Sobola, S.; Pöhls, H.C.; Taubmann, B.; Köstler, J.; Puchta, A.; Freiling, F.; Reiser, H.P.; et al. Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 2021, 103. [Google Scholar] [CrossRef]
- Vielberth, M.; Pernul, G. A Security Information and Event Management Pattern Conference. In Proceedings of the 12th Latin American Conference on Pattern Languages of Programs (SLPLoP), Valparaiso, Chile, 20–23 November 2018. [Google Scholar]
- Steffi, R. Enhancing Security Information and Event Management to Develop Future-Ready Security Operations Center. Int. J. Eng. Tech. Res. (IJETR) 2016, 5, 2454–4698. [Google Scholar]
- Granadillo, G.G.; Mustapha, Y.B.; Hachem, N.; Debar, H. An Ontology-driven approach to model SIEM Information and Operations using the SWRL formalism. Int. J. Electron. Secur. Digit. Forensics 2012, 4, 104–123. [Google Scholar] [CrossRef]
- Barros, A. SIEM Correlation Is Overrated. Gartner Blog. Available online: http://blogs.gartner.com/augusto-barros/2017/03/31/siem-correlation-is-overrated/ (accessed on 29 March 2020).
- Shvachko, K.; Kuang, H.; Radia, S.; Chansler, R. The Hadoop Distributed File System. In Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), Incline Village, NV, USA, 3–7 May 2010. [Google Scholar]
- Ask, M.; Bondarenko, P.; Rekdal, J.E.; Nordbo, A.; Ruthven, P.B.; Piatkivskyi, D. Advanced Persistent Threat (APT): Beyond the Hype; Project Report; IMT: Lucca, Italy, 2013. [Google Scholar]
- Dobre, D.; Girao, J.; Karame, G. Towards Trustworthy Cloud Storage. NEC Tech. J. 2013, 8, 77–81. [Google Scholar]
- Scarfone, K. Seven Questions to Ask before Buying SIEM Products. Online Research. Available online: http://searchsecurity.techtarget.com/feature/Seven-questions-to-ask-before-buying-SIEM-products (accessed on 6 May 2020).
- McGuiness, T. Defense in Depth; SANS White Paper v1.2E, Information Security Reading Room; SANS: North Bethesda, MD, USA, 2011. [Google Scholar]
- Wang, L.; Li, Z.; Ren, S.; Kwiat, K. Optimal Voting Strategy against Random and Targeted Attacks. Int. J. Secur. Softw. Eng. 2013, 4, 25–46. [Google Scholar] [CrossRef]
- Littlewood, B.; Wright, D. The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. Trans. Softw. Eng. 2007, 33, 347–365. [Google Scholar] [CrossRef]
- Gonzalez, J.J. Towards a cyber security reporting system—A quality improvement process. In International Conference on Computer Safety, Reliability, and Security; Springer: Berlin/Heidelberg, Germany, 2005; pp. 368–380. [Google Scholar]
- Lee, C. A Study on Introducing Cyber Security Incident Reporting Regulations for Nuclear Facilities. International Conference on Cyber-Technologies and Cyber-Systems. 2017. Available online: https://www.thinkmind.org/articles/cyber_2017_4_20_80046.pdf (accessed on 31 May 2021).
- Johnson, C.W. Architectures for cyber-security incident reporting in safety-critical systems. In Disaster Management: Enabling Resilience; Springer: Berlin/Heidelberg, Germany, 2015; pp. 127–141. [Google Scholar]
- Cyber Security for Europe Consortium. Research and Development Roadmap 2. Project deliverable (D4.4). 2021. Available online: https://cybersec4europe.eu/publications/deliverables/ (accessed on 1 June 2021).
- Filkins, B. An Evaluator’s Guide to NextGen SIEM. SANS White Paper. 2018. Available online: https://gallery.logrhythm.com/independent-white-papers/sans-an-evaluators-guide-to-next-gen-siem-independent-white-paper-2018.pdf (accessed on 31 May 2021).
- Esri. The Geospatial Approach to Cyber Security: An Executive Overview. White Paper. Available online: https://www.esri.com/~/media/Files/Pdfs/library/whitepapers/pdfs/geospatial-approach-cybersecurity.pdf (accessed on 15 December 2020).
- Slingsby, A.; Dykes, J.; Wood, J. Exploring uncertainty in geodemographics with interactive graphics. Trans. Vis. Comput. Graph. 2011, 17, 2545–2554. [Google Scholar] [CrossRef] [Green Version]
- Rosencrance, L. Security Information and Event Management (SIEM). TechTarget Technical Paper. 2016. Available online: https://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM (accessed on 31 May 2021).
- Longbottom, C. Get to Know SIEM Software Basics and Benefits. TechTarget Technical Paper. 2018. Available online: https://searchdatacenter.techtarget.com/tip/Get-to-know-SIEM-software-basics-and-benefits?_ga=2.147979831.1077932165.1624014464-278441071.1618836279 (accessed on 13 January 2021).
- Splunk. Top 5 SIEM Trends to Watch in 2021. Technical Report. 2018. Available online: https://f.hubspotusercontent30.net/hubfs/8156085/Splunk.%20Top%205%20SIEM%20trends%20to%20Watch%20in%202021.pdf (accessed on 15 December 2020).
- Team FME. PESTLE Analysis: Strategy Skills. Ebook. Available online: http://www.free-management-ebooks.com/dldebk-pdf/fme-pestle-analysis.pdf (accessed on 29 May 2020).
- European Commission. Commission Signs Agreement with Industry on Cybersecurity and Steps Up Efforts to Tackle Cyber-Threats; European Commission: Brussels, Belgium, 2016. [Google Scholar]
- ECS. About the cPPP. Available online: https://www.ecs-org.eu/cppp (accessed on 14 January 2021).
- European Parliament. Precarious Employment in Europe. Part 1: Patterns, Trends and Policy Strategy; European Parliament: Brussels, Belgium, 2016. [Google Scholar]
- Leighton, P. Future Working: The Rise Of European’s Independent Professionals; European Forum of Independent Professionals: Brussels, Belgium, 2016. [Google Scholar]
- Morgan, S. One Million Cybersecurity Job Openings in 2016. Forbes Article. Available online: https://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/?sh=14989bc427ea (accessed on 14 January 2021).
- The Economist. Why Giants Thrive. The Power of Technology, Globalisation and Regulation. Special Report. Available online: https://www.economist.com/special-report/2016/09/15/why-giants-thrive (accessed on 14 December 2020).
- Toesland, F. Why SMEs Are Big Targets for Cyber Crime; Racounter: London, UK, 2016; Available online: https://www.raconteur.net/why-smes-are-big-targets-for-cyber-crime/ (accessed on 30 March 2020).
- Jiang, M.; Tsai, H.S.; Cotten, S.R.; Rifon, N.J.; LaRose, R.; Alhabash, S. Generational differences in online safety perceptions, knowledge, and practices. Educ. Gerontol. 2016, 42, 1–14. [Google Scholar] [CrossRef]
- Kemp, S. DIGITAL in 2016. We Are Social. Special Report. Available online: https://wearesocial.com/uk/special-reports/digital-in-2016 (accessed on 30 March 2020).
- Passeri, P. 2016 Cyber Attacks Statistics. Hackmaggeddon, Information Security Timelines and Statistics. Online Report. Available online: http://www.hackmageddon.com/2017/01/19/2016-cyber-attacks-statistics/ (accessed on 14 January 2021).
- Ciancaglini, V.; Balduzzi, M.; McArdle, R.; Rosler, M. Below the Surface: Exploring the Deep Web. Research Paper at TrendLabs. Available online: https://documents.trendmicro.com/assets/wp/wp_below_the_surface.pdf (accessed on 31 May 2021).
- Bradley, J.; Loucks, J.; Macaulay, J.; Medcalf, R.; Buckalew, L. BYOD: A Global Perspective; Cisco Survey Report; Cisco: San Jose, CA, USA, 2012. [Google Scholar]
- Suarez-Tangil, G.; Palomar, E.; Ribagorda, A.; Sanz, I. Providing SIEM systems with self-adaptation. Inf. Fusion 2015, 21, 145–158. [Google Scholar] [CrossRef] [Green Version]
- Evans, D. The Internet of Everything—How More Relevant and Valuable Connections Will Change the World. Cisco Point of View. 2012. Available online: http://www.lehigh.edu/~inengrit/dropbox/eac1113/Cisco_Internet-of-Everything.pdf (accessed on 30 March 2020).
- European Parliament. Regulation (EU) 2016/679 of the European Parliament and of the Council. 2016. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679 (accessed on 1 April 2020).
- European Commission. EU Data Protection Reform, What Benefits for Businesses in Europe? 2016. Available online: http://ec.europa.eu/newsroom/just/document.cfm?doc_id=41524 (accessed on 1 April 2020).
- Data Protection Working Party. Opinion on the Evaluation and Review of the ePrivacy Directive (2002/58/EC). Available online: https://www.pdpjournals.com/docs/88612.pdf (accessed on 1 April 2020).
- Data Protection Working Party. Working Document 01/2016 on the Justification of Interferences with the Fundamental Rights to Privacy and Data Protection through Surveillance Measures when Transferring Personal Data (European Essential Guarantees); European Commission: Brussels, Belgium, 2016. [Google Scholar]
- Sheridan, K. Future of the SIEM. Dark Reading. Threat Intelligence Article. 2017. Available online: https://www.darkreading.com/threat-intelligence/future-of-the-siem-/d/d-id/1328457 (accessed on 20 May 2020).
- Radoglou-Grammatikis, P.; Sarigiannidis, P.; Iturbe, E.; Rios, E.; Martinez, S.; Sarigiannidis, A.; Eftathopoulos, G.; Spyridis, Y.; Sesis, A.; Vakakise, N.; et al. SPEAR SIEM: A Security Information and Event Management system for the Smart Grid. Comput. Netw. 2021, 193. [Google Scholar] [CrossRef]
- Homer, J.; Zhang, S.; Ou, X.; Schmidt, D.; Du, Y.; Rajagopalan, S.R.; Singhal, A. Aggregating vulnerability metrics in enterprise networks using attack graphs. J. Comput. Secur. 2013, 21, 561–597. [Google Scholar] [CrossRef] [Green Version]
- Yasasin, E.; Schryen, G. Requirements for IT Security Metrics—An Argumentation Theory Based Approach. In European Conference on Information Systems—ECIS; Completed Research Paper; Paper 208; ECIS: Münster, Germany, 2015. [Google Scholar]
- Garcia, M.; Bessani, A.; Gashi, I.; Neves, N.; Obelheiro, R. Analysis of operating system diversity for intrusion tolerance. Softw. Pract. Exp. 2014, 44, 735–770. [Google Scholar] [CrossRef] [Green Version]
- Kulkarni, R.D. Using Ensemble Methods for Improving Classification of the KDD CUP ’99 Data Set. Iosr J. Comput. Eng. 2014, 16, 57–61. [Google Scholar] [CrossRef]
- Nunes, E.; Diab, A.; Gunn, A.; Marin, E.; Mishra, V.; Paliath, V.; Shakarian, P. Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence. In Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 28–30 September 2016; pp. 1–6. [Google Scholar]
- Kergl, D. Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract. In Proceedings of the 2015 IEEE International Conference on Data Mining Workshop (ICDMW), Atlantic City, NJ, USA, 14–17 November 2015; pp. 1532–1533. [Google Scholar]
- Jenhani, F.; Gouider, M.S.; Said, L.B. A Hybrid Approach for Drug Abuse Events Extraction from Twitter. Procedia Comput. Sci. 2016, 96, 1032–1040. [Google Scholar] [CrossRef] [Green Version]
- Serckumecka, A.; Medeiros, I.; Ferreira, B.; Bessani, A. Cost-Effective Cloud Event Archival for SIEMs. In Proceedings of the 38th International Symposium on Reliable Distributed Systems Workshops (SRDSW), Lyon, France, 1–4 October 2019. [Google Scholar]
- EM360 Tech. Top 10 Threat Intelligence Platforms. 2020. Available online: https://em360tech.com/top-10/top-10-threat-intelligence-platforms (accessed on 7 June 2021).
- Lord, N. What is Endpoint Detection and Response? A Definition of Endpoint Detection & Response. Data Insider Report. 2019. Available online: https://digitalguardian.com/blog/what-endpoint-detection-and-response-definition-endpoint-detection-response (accessed on 30 March 2020).
- Brook, C. What is a Next Generation Firewall? Learn about the Differences between NGFW and Traditional Firewalls. Data Insider Report. 2020. Available online: https://digitalguardian.com/blog/what-next-generation-firewall-learn-about-differences-between-ngfw-and-traditional-firewalls (accessed on 14 January 2021).
- Inquisit IT. Security Orchestration Automation and Response (SOAR). White Paper. 2020. Available online: https://www.inquisitllc.com/wp-content/uploads/2020/05/White-Paper-Security-Orchestration-Automation-and-Response.pdf (accessed on 7 June 2021).
- Stern, A. Back to Basics: What Is Security Automation? Siemplify Article. 2018. Available online: https://www.siemplify.co/blog/what-is-security-automation/ (accessed on 14 December 2020).
- TrustRadius. Incident Response Platforms. Available online: https://www.trustradius.com/incident-response (accessed on 31 May 2021).
- Gartner. Gartner Market Guide for SOAR Solutions: Techno-Darwinism and the Next Evolution of SOAR. White Paper. 2020. Available online: https://www.dflabs.com/wp-content/uploads/2020/12/DFLabs_White_Paper_Gartner_Market_Guide_for_SOAR_Solutions.pdf (accessed on 31 May 2021).
- Tankard, C. Goodbye SIEM, Hello SOARX. Netw. Secur. 2019, 2019. [Google Scholar] [CrossRef]
- Di Mauro, M.; Di Sarno, C. Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection. J. Inf. Secur. Appl. 2018, 38, 85–95. [Google Scholar] [CrossRef] [Green Version]
- Ahlberg, C. Moving Toward a Security Intelligence Program. In The Threat Intelligence Handbook, 2nd ed.; CyberEdge Group LLC: Annapolis, MD, USA, 2019; Available online: https://paper.bobylive.com/Security/threat-intelligence-handbook-second-edition.pdf (accessed on 31 May 2021).
- Researcg, O. The Value of Threat Intelligence. White Paper. 2019. Available online: https://www.spamhaus.com/custom-content/uploads/2020/04/2019-The-Value-of-Threat-Intelligence-White-Paper-LR.pdf (accessed on 14 December 2020).
- Kinyua, J.; Awuah, L. AI/ML in Security Orchestration, Automation and Response: Future Research Directions. Intell. Autom. Soft Comput. 2020. [Google Scholar] [CrossRef]
- Canner, B. AI in SIEM: The Benefits for Enterprises of All Sizes. Solutions Review Article. 2019. Available online: https://solutionsreview.com/security-information-event-management/ai-in-siem-the-benefits-for-enterprises-of-all-sizes/ (accessed on 31 May 2021).
- Shein, E. AI Is the Future of SIEM. Survey Report. 2018. Available online: https://www.midlandinfosys.com/pdf/qradar-cybersecurity-ai-qradar-siem-wp.pdf (accessed on 31 May 2021).
- Canner, B. Machine Learning, SIEM, and Security Analytics: What to Know. Solutions Review Article. 2018. Available online: https://solutionsreview.com/security-information-event-management/machine-learning-siem-security-analytics-know (accessed on 7 June 2021).
- Columbus, L. 10 Ways AI And Machine Learning Are Improving Endpoint Security. 2019. Available online: https://www.business2community.com/celebrity/10-ways-ai-and-machine-learning-are-improving-endpoint-security-02247235 (accessed on 31 May 2021).
- Kotenko, I.; Polubelova, O.; Saenko, I.; Doynikova, E. The ontology of metrics for security evaluation and decision support in SIEM systems. In Proceedings of the 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany, 2–6 September 2013; pp. 638–645. [Google Scholar]
- Eswaran, S.; Srinivasan, A.; Honnavalli, P. A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise. Netw. Secur. 2021, 7–16. [Google Scholar] [CrossRef]
- Sancho, J.C.; Caro, A.; Ávila, M.; Bravo, A. New approach for threat classification and security risk estimations based on security event management. Future Gener. Comput. Syst. 2020, 113, 488–505. [Google Scholar] [CrossRef]
- Hollister, A. Similarities and Diferences between XDR and SIEM. Forbes Technology Council Post. 2021. Available online: https://www.forbes.com/sites/forbestechcouncil/2021/03/31/similarities-and-differences-between-xdr-and-siem/?sh=415ace6f79c1 (accessed on 31 May 2021).
- Gordon, K.; Dion, M. Protection of Critical Infrastructure and the Role of Investment Policies Relating to National Security. OECD White Paper. 2008. Available online: https://www.oecd.org/daf/inv/investment-policy/40700392.pdf (accessed on 14 December 2020).
- Gonzalez Granadillo, G.; Rubio Hernandez, J.; Garcia Alfaro, J. Towards a Security Event Data Taxonomy. In Proceedings of the 12th International Conference on Risks and Security of Internet and Systems, CRiSIS, Dinard, France, 19–21 September 2017. [Google Scholar]
- Gonzalez Granadillo, G.; Rubio Hernandez, J.; Garcia Alfaro, J. Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances. IEEE Access J. 2017, 6, 8810–8828. [Google Scholar] [CrossRef]
- Hindy, H.; Brosset, D.; Bayne, E.; Seeam, A.; Bellekens, X. Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning. In ESORICS International Workshops, CyberICPS and SECPRE; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef] [Green Version]
- Fortinet. What Is Critical Infrastructure Protection (CIP)? Cyber Glossary Topic Page. Available online: https://www.fortinet.com/resources/cyberglossary/critical-infrastructure-protection (accessed on 31 May 2021).
- Exabeam. Protect Critical Infrastructure form Insider Threats with Security Intelligence. White Paper. 2018. Available online: https://www.exabeam.com/library/protect-critical-infrastructure-insider-threats-security-intelligence/ (accessed on 14 December 2020).
- Gonzalez Granadillo, G.; Gonzalez-Zarzosa, S.; Faiella, M. Towards an Enhanced Security Data Analytic Platform. In Proceedings of the 15th International Conference on Security and Cryptography, SECRYPT, Porto, Portugal, 26–28 July 2018. [Google Scholar]
- Faiella, M.; Gonzalez Granadillo, G.; Medeiros, I.; Azevedo, R.; Gonzalez-Zarzosa, S. Enriching Threat Intelligence Platforms, Conference on Security and Cryptograph. In Proceedings of the Conference on Security and Cryptography, SECRYPT, Prague, Czech Republic, 26–28 July 2019. [Google Scholar]
- Gonzalez Granadillo, G.; Faiella, M.; Medeiros, I.; Azevedo, R.; Gonzalez-Zarzosa, S. ETIP: An Enriched Threat Intelligence Platform for Improving OSINT Correlation, Analysis, Visualization and Sharing Capabilities. J. Inf. Secur. Appl. 2021, 58, 102715. [Google Scholar]
- Bailey, T.; Maruyama, A.; Wallance, D. The Energy-Sector Threat: How to Address Cybersecurity Vulnerabilities, McKinsey & Company. 2020. Available online: https://www.mckinsey.com/business-functions/risk/our-insights/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities (accessed on 31 May 2021).
- Cerullo, G.; Formicola, V.; Iamiglio, P.; Sgaglione, L. Critical Infrastructure Protection: Having SIEM technology cope with network heterogeneity. arXiv 2014, arXiv:1404.7563. [Google Scholar]
- Chokalingam, A. Water Critical Infrastructure Cybersecurity: Detecting an Attack, LogRhythm Security Tips and Tricks. 2021. Available online: https://logrhythm.com/blog/securing-water-critical-infrastructure-detecting-a-life-threatening-attack-part-1/ and https://logrhythm.com/blog/securing-water-critical-infrastructure-part-2/ (accessed on 31 May 2021).
- WaterISAC. Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. Industrial Control Systems Emergency Response Team. 2016. Available online: https://www.waterisac.org/system/files/articles/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C_0.pdf (accessed on 14 December 2020).
- Sammon, J.P.; Caverly, R.J. Transportation Systems: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan, Homeland Security Dept. 2007. Available online: https://www.dhs.gov/xlibrary/assets/Transportation_Base_Plan_5_21_07.pdf (accessed on 14 December 2020).
- MARSH. Cyber risk in the Transportation Industry. White Paper. 2015. Available online: https://www.marsh.com/uk/insights/research/cyber-risk-in-the-transportation-industry.html (accessed on 14 December 2020).
- Müller, R. Developing a Security Event Management System for Intermodal Transport. In Dynamics in Logistics; Springer: Berlin/Heidelberg, Germany, 2008; pp. 405–412. [Google Scholar]
- PierNext. Are Ports Prepared to Deal with Threats from Hackers? 2018. Available online: https://piernext.portdebarcelona.cat/en/technology/are-ports-prepared-to-deal-with-threats-from-hackers/ (accessed on 15 December 2020).
- Pitropakis, N.; Logothetis, M.; Andrienko, G.; Stefanatos, J.; Karapistoli, E.; Lambrinoudakis, C. Towards The Creation of a Threat Intelligence Framework for Maritime Infrastructures. In Computer Security; Springer: Berlin/Heidelberg, Germany, 2019; pp. 53–59. [Google Scholar]
- IBM X-Force. Security Trends in the Healthcare Industry. 2017. Available online: https://www.ibm.com/downloads/cas/PLWZ76MM (accessed on 15 December 2020).
- Medical Device Coordination Group (MDCG). Guidance on Cybersecurity for Medical Devices. 2019. Available online: https://ec.europa.eu/docsroom/documents/38941/attachments/1/translations/en/renditions/native (accessed on 15 December 2020).
- Biddle, S. Why SIEM Solutions Are Essential to Securing Healthcare Networks. Fortinet Article. 2017. Available online: https://www.fortinet.com/blog/industry-trends/why-siem-solutions-are-essential-to-securing-healthcare-networks (accessed on 15 December 2020).
- O’Dowd, E. How SIEM Solutions Work to Secure Health IT Infrastructure. HIT Infrastructure. Xtelligent Healthcare Media Report. 2016. Available online: https://hitinfrastructure.com/news/how-siem-solutions-work-to-secure-health-it-infrastructure (accessed on 13 January 2021).
- Canner, B. How SIEM Solutions Can Help Secure Financial Enterprises. Solutions Review Report. 2020. Available online: https://solutionsreview.com/security-information-event-management/how-siem-solutions-can-help-secure-financial-enterprises/ (accessed on 13 January 2021).
- DataComm Team. SIEM Use Cases for Financial Institutions. DataComm Report. 2019. Available online: https://info.datacomm.com/siem-use-cases-for-financial-institutions (accessed on 13 January 2021).
- LogSentinel. LogSentinel SIEM for the Financial Sector. Available online: https://logsentinel.com/solutions/logsentinel-for-the-financial-sector/?cookie-state-change=1621516381127 (accessed on 31 May 2021).
- TechTarget. TechTarget SearchSecurity Website. Available online: http://searchsecurity.techtarget.com/ (accessed on 31 May 2021).
- InfoTech. Info-Tech Research Group Website. Available online: http://www.infotech.com/ (accessed on 31 May 2021).
- TechTarget, SearchSecurity. How to Define SIEM Strategy, Management and Success in the Enterprise. Technical Guide. 2014. Available online: https://searchsecurity.techtarget.com/essentialguide/How-to-define-SIEM-strategy-management-and-success-in-the-enterprise (accessed on 13 January 2021).
- Info-Tech Research Group. Vendor Landscape: Security Information & Event Management. In Optimize IT Security Management and Simplify Compliance with SIEM Tools; Technical Report; Info-Tech Research Group: London, ON, Canada, 2015. [Google Scholar]
- Kotenko, I.; Checulin, A. Attack Modeling and Security Evaluation in SIEM Systems. Trans. Syst. Sci. Appl. 2012, 8, 129–147. [Google Scholar]
SIEM Vendor | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2020 |
---|---|---|---|---|---|---|---|---|---|---|
HP/ArcSight/HPE [24] | ★ | ★ | ★ | ★ | ★ | ★ | ★ | ⧫ | ||
RSA/EMC [25] | ★ | ★ | ⧫ | ⧫ | ⧫ | ⧫ | ⧫ | ⧫ | ★ | ★ |
SenSage [26] | ★ | ■ | ▲ | ▲ | ||||||
LogLogic [27] | ★ | ★ | ⧫ | |||||||
Symantec [28] | ★ | ★ | ⧫ | ⧫ | ||||||
Q1Labs [29] | ★ | ★ | ★ | ★ | ||||||
Novell [30] | ★ | ★ | ★ | |||||||
IBM [31] | ⧫ | ⧫ | ★ | ★ | ★ | ★ | ★ | ★ | ★ | ★ |
Quest Software [32] | ⧫ | ⧫ | ||||||||
CA [33] | ⧫ | |||||||||
Tenable [34] | ▲ | ■ | ▲ | ▲ | ▲ | |||||
Prism Microsystems [35] | ▲ | ■ | ▲ | |||||||
LogMatrix [36] | ▲ | |||||||||
NetIQ/Microfocus [37] | ■ | ▲ | ★ | ⧫ | ⧫ | ▲ | ▲ | ▲ | ⧫ | ▲ |
McAfee/Intel [38] | ■ | ★ | ★ | ★ | ★ | ★ | ★ | ★ | ★ | ▲ |
Trustwave [39] | ■ | ■ | ■ | ▲ | ▲ | ▲ | ▲ | ▲ | ||
LogRhythm [40] | ■ | ■ | ★ | ★ | ★ | ★ | ★ | ★ | ★ | ★ |
TriGeo [41] | ■ | ■ | ||||||||
netForensics [42] | ■ | ■ | ||||||||
eIQnetworks [43] | ■ | ■ | ■ | ▲ | ||||||
Splunk [44] | ▲ | ⧫ | ★ | ★ | ★ | ★ | ★ | ★ | ★ | |
Tripwire [45] | ▲ | |||||||||
AlienVault/ AT&T Cybersecurity [46] | ▲ | ■ | ■ | ■ | ■ | ■ | ▲ | ▲ | ▲ | |
Correlog [47] | ▲ | ▲ | ||||||||
S21sec [48] | ▲ | ▲ | ||||||||
Tango/04 [49] | ▲ | ▲ | ||||||||
Tier-3 [50] | ■ | ■ | ||||||||
SolarWinds [51] | ■ | ⧫ | ▲ | ▲ | ▲ | ▲ | ▲ | ▲ | ||
Tibco-LogLogic [52] | ■ | ⧫ | ||||||||
EventTracker [53] | ▲ | ▲ | ▲ | ▲ | ▲ | ▲ | ||||
AccelOps/Fortinet [54] | ▲ | ▲ | ▲ | ▲ | ▲ | ▲ | ||||
Blackstratus [55] | ▲ | ▲ | ▲ | ▲ | ▲ | |||||
Manage Engine [56] | ▲ | ▲ | ▲ | ▲ | ||||||
FireEye [57] | ▲ | ▲ | ||||||||
Venustech [58] | ▲ | ▲ | ||||||||
Rapid7 [59] | ■ | ■ | ★ | |||||||
Exabeam [60] | ■ | ★ | ★ | |||||||
Securonix [61] | ■ | ★ | ★ | |||||||
LogPoint [62] | ▲ | ■ | ||||||||
HanSight [63] | ▲ |
ArcSight Enterprise Security Manager (MicroFocus/ HPE/ NetIQ) | Provides a graphical interface for the Security Operations Center (SOC) team and a set of applications or external commands that help the correlation and/or investigation processes. | Limited visualization options and intricate correlation rules [17]. The information associated with events is immutable, with evident deficits when it comes to adapting the product to company processes and needs. |
Qradar (IBM) | Can be deployed as a hardware, software, or virtual appliance, as well as a Software as a Service (SaaS) on the IBM cloud. Provides a user interface for real-time event and view, reports, offenses, asset information, and product management. Offers support for threat intelligence feeds. | Provides basic reaction capabilities that include reporting and alerting functions. The endpoint monitoring for threat detection and response, or basic file integrity requires the use of third-party technologies. |
McAfee Enterprise Security Manager (McAfee/ Intel) | Allows for scalable and versatile SIEM architecture, delivering real-time forensics, comprehensive application and database traffic/content monitoring, advanced rule and risk-based correlation for real-time as well as historical incident detection and automatic reaction. | Requires the use of additional solutions (e.g., McAfee Active Response). Predictive analytics and other built-in features such as behavioral analysis are poorly developed. |
LogRhythm Next GEN SIEM Platform (LogRhythm) | Provides end-point monitoring, network forensics, user and entity behavior analytics, and response capabilities. Can be deployed in an appliance, software or virtual instance supporting scalable decentralized architectures | Unsuitable for organizations with critical infrastructures although extensions can be deployed to enhance the SIEM capabilities. Requires high degree automation and out-of-the-box content. |
USM and OSSIM (AT&T Cybersecurity/ AlienVault) | Offers both commercial solutions (i.e., Alienvault Unified Security Management-USM ) and open source SIEM solutions. (i.e., OSSIM). Includes a web-based graphical interface for administration, reporting and security event management. | Limited user or entity behavior analytics as well as machine learning capabilities. Basic reaction capabilities (e.g., send email, execute script, open ticket) and limited to the pre-defined set of conditions associated to a security policy. |
RSA Netwitness Platform (Dell) | Analyzes data and behavior of people and processes within a network across a company’s logs, packets, and end-points. Focuses on advanced threat detection. Provides strong OT monitoring capabilities | It requires a wide understanding of the breadth of the options and the implications for cost, functionality, and scalability. |
Splunk Enterprise Security (Splunk) | Market-leading platform in Operational Intelligence. Offers data collection, indexing, and visualization capabilities for security events monitoring. Uses advanced security analytics, which include both unsupervised machine learning and user behavior capabilities. | Uses basic predefined correlation rules for monitoring and reporting requirements. Reaction capabilities are limited to email notifications. Requires integration with third-party applications for task and workflow automation. |
SolarWinds Log and event Manager (SolarWinds) | Provides centralized log collection and normalization, automated threat detection and response, intuitive visualization, and user interface, as well as real time correlation and log searching to support investigation. | Lacks support for monitoring public cloud services’ IaaS or SaaS. Does not support custom report writing and customization of out-of-the-box compliance report templates. |
Functionality | ArcSight | QRadar | McAfee | LogRhythm | USM-OSSIM | RSA | Splunk | SolarWinds |
---|---|---|---|---|---|---|---|---|
Correlation rules | ∘ | ∘ | • | • | • | ∘ | − | • |
Data sources | • | • | • | ∘ | ∘ | • | • | ∘ |
Real time processing | • | • | • | • | • | • | • | • |
Data volume | • | ∘ | • | ∘ | ∘ | ∘ | • | ∘ |
Visualization | − | ∘ | ∘ | ∘ | ∘ | ∘ | • | ∘ |
Data analytics | ∘ | • | ∘ | • | ∘ | ∘ | • | ∘ |
Performance | ∘ | ∘ | • | ∘ | ∘ | • | ∘ | • |
Forensics | − | • | • | ∘ | • | • | ∘ | ∘ |
Complexity | • | ∘ | ∘ | ∘ | ∘ | • | • | • |
Scalability | • | • | • | • | − | • | • | • |
Risk analysis | − | ∘ | ∘ | ∘ | − | ∘ | − | ∘ |
Storage | ∘ | ∘ | • | ∘ | ∘ | ∘ | ∘ | • |
Price | • | • | • | ∘ | ∘ | • | • | ∘ |
Resilience | ∘ | • | • | ∘ | ∘ | • | ∘ | ∘ |
Reaction and reporting | − | − | • | • | − | ∘ | ∘ | ∘ |
UEBA | • | • | − | • | − | • | • | − |
Security | • | • | − | − | ∘ | ∘ | ∘ | − |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
González-Granadillo, G.; González-Zarzosa, S.; Diaz, R. Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures. Sensors 2021, 21, 4759. https://doi.org/10.3390/s21144759
González-Granadillo G, González-Zarzosa S, Diaz R. Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures. Sensors. 2021; 21(14):4759. https://doi.org/10.3390/s21144759
Chicago/Turabian StyleGonzález-Granadillo, Gustavo, Susana González-Zarzosa, and Rodrigo Diaz. 2021. "Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures" Sensors 21, no. 14: 4759. https://doi.org/10.3390/s21144759