Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection
Abstract
:1. Introduction
- Event filtering: Irrelevant log data are discarded to reduce the volume during the event filtering phase.
- Event aggregation and de-duplication: The aggregation of closely related log data and merging of identical data occur in the event aggregation and de-duplication phase.
- Event masking: Log data generated after a system failure is masked in this phase.
- Root cause analysis: In the root cause analysis, dependencies between log data events are analyzed using tools such as dependency diagrams to explain log data events by other log data events.
- In this research work, we propose and develop a novel correlation engine, the OC, which is a fast and efficient correlation engine using the high-performance multiple regex matching library “Hyperscan” for parallel log data scanning.
- Our proposed OC outperforms the traditional correlation engine significantly and improves the overall performance of the SIEM system while making it more effective and efficient in detecting cyberattacks.
- Our proposed OC has successfully detected some multi-layered attacks, including application layer and data-link layer attacks.
2. Existing Approaches
- The Esper tool is primarily designed to work on a stream of events. It does not process text files rather it works on a stream of events coming into it.
- The Drools tool is not optimized for memory efficiency, as it struggled to complete some scenarios due to its high memory requirements.
- NodeBrain does not have file I/O capabilities; therefore, it cannot process text files.
- The Prelude correlator component is not independently available for use, rather, we have to install and configure the complete Prelude SIEM solution. In addition, we also need to understand PRL language for rule writing. More importantly, the Prelude correlator cannot directly process text files, rendering it infeasible for our integration scenario.
- The OSSEC tool can process text files, but the exact format of the stored data must be explicitly specified in its configuration file. In our integration scenario, we require the correlation engine to process text files with multiple data formats. Therefore OSSEC does not seem feasible in our integration scenario.
- The OSSIM correlation engine details are not available. Although it is free to use, it comes in a virtual machine and does not expose its correlation engine interface for use.
- For better detection of attacks, several rules can be linked together in the correlation process. This provides improved context data for the correlation process.
- The support of Perl functions in SEC provides a useful platform for users to utilize and benefit from other Perl modules.
- The support of named match variables and the caching of matches provides a very effective feature for pattern matching and the use of Perl functions.
- Hierarchically organizing rule sets can enhance their effectiveness. When managing multiple rule sets and seeking to process data so that when one rule is triggered, unnecessary subsequent rules are bypassed, and the process jumps directly to a specified rule, the utilization of the “skip rules” keyword is exceptionally advantageous.
- Rule-based.
- Ease of use.
- Fast learning curve.
- Low resource requirements.
- Good documentation and support.
- Simple deployment and configuration.
- Can read input from a file, named pipe, or standard input.
3. Proposed Correlation Engine Design
Algorithm 1: Working principle of OC. |
- Technique 1: Hyperscan uses a graph decomposition technique that converts regular expression matching into a series of string and finite automata matching. During this process, redundant operations are eliminated. The decomposed regular expressions increase the chances of a fast DFA match because they are smaller than the original pattern.
- Technique 2: Hyperscan also accelerates the matching of strings and finite automata by using single instruction, multiple data (SIMD) operations.
3.1. Compile Time
3.2. Run Time
- Hyperscan leverages algorithmic innovation by exploiting the Intel processor’s SIMD architecture, utilizing various SIMD registers to achieve superior performance in pattern-matching tasks, a capability lacking in traditional regex-matching algorithms.
- Hyperscan uses the multithreading approach, processing multiple pattern-matching tasks concurrently unlike the traditional regex-matching algorithm, giving it a performance boost.
4. Experimental Setup
4.1. Assumptions
- The PC-1 and PC-2 machines run the Windows operating system (Windows 10), while the PC-3 machine operates on the Linux operating system (CentOS-7). The SIEM system machine operates on the CentOS-7 operating system, and the SIEM software, which we call the Cyber Threat Monitoring System (CTMS-ver 1.0, CIPMA Lab, PIEAS, Islamabad, Pakistan), is installed on it.
- The logs collected at the SIEM system through the NXLog tool should contain logs for failed login attempts into three PC machines along with many other OS logs.
- The rule file contains two rules for detecting failed login attempts for Windows and Linux operating systems.
- The SIEM System machine has an Intel processor with SIMD architecture to be used by the OC’s Hyperscan module.
4.2. Limitations
5. Results and Discussion
6. Detection of Multi-Layered Attacks Using OC
6.1. Detection of DoS Attack
- Simple GoldenEye DoS attack:./goldeneye.py http://victim-machine-ip:80 -s 1000
- Random GoldenEye DoS attack:./goldeneye.py http://victim-machine-ip:80 -w 10 -s 1000 -m random
- Slow HTTP DoS attack:slowhttptest -c 500 -H -g -o ./output-file -i 10 -r 200 -t GET -u http://victim-machine-ip -x 24 -p 2
- SlowLoris DoS attack:slowloris victim-machine-ip -s 500
[Mon Apr 03 15:39:23.582048] [mpm_winnt:error] [pid 1196:tid 4020] AH00326: Server ran out of threads to serve requests. Consider raising the ThreadsPerChild setting |
type=Single ptype=RegExp pattern=\[pid \d+\:tid \d+] \S+\d+\: Server ran out of threads to serve requests. Consider raising the ThreadsPerChild setting desc=DoS attack action=write alert_file Alert - DoS attack detected. |
6.2. Detection of FTP Attack
ftp_login host=victim-machine-ip user=FILE0 password=FILE1 0=usernames.txt 1=passwordlist.txt -x ignore:mesg=‘Login incorrect.’ |
Mon Apr 3 17:06:15 2023 [pid 3502] [ubuntu] FAIL LOGIN: Client “::ffff:192.168.99.160” |
type=Single ptype=RegExp pattern=(\S+ \S+ \d+ \d+\:\d+\:\d+ \d+) \ FAIL LOGIN\: Client \"\:\:\S+\:(\d+\.\d+\.\d+\.\d+)\" desc=Failed FTP login attempt action=write alert_file A failed FTP login attempt detected from $2 to $1 |
6.3. Detection of Failed Login Attack
{"EventTime":"2024-06-16 15:22:34","Hostname":"CTMS-Client","Keywords":-921886 8437227405312,"EventType":"AUDIT_FAILURE","SeverityValue":4,"Severity": "ERROR","EventID":4625,"SourceName":"Microsoft-Windows-Security-Auditing", "ProviderGuid":"54849625-5478-4994-A5BA-3E3B0328C30D","Version":0,"Task":12544, "OpcodeValue":0,"RecordNumber":71996,"ActivityID":"20804495-9F3D-0004-E244- 80203D9FD901","ProcessID":1060,"ThreadID":14464,"Channel":"Security","Message": "An account failed to log on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-5- 18\r\n\tAccount Name:\t\tCTMS-CLIENT$\r\n\tAccount Domain:\t\t WORKGROUP\r\n\tLogon ID:\t\t0x3E7\r\n\r\nLogon Type:\t\t\t2\r\n\r\n Account For Which Logon Failed:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\tclient\r\n\tAccount Domain:\t\tCTMS-CLIENT\r\n\r\n\tFailure Reason:\t\tUnknown user name or bad password.\r\n\t. . . } |
type=Single ptype=RegExp pattern=\{\"EventTime\"\:\"(\d+\-\d+\-\d+ \d+\:\d+\:\d+)\"\,\"Hostname\"\: \"(\S+)\"\,\"Keywords\"\:\-\d+\,\"EventType\"\:\"\S+\"\,\"SeverityValue\"\: \d+\,\"Severity\"\:\"\S+\"\,\"EventID\"\:\d+\,\"SourceName\"\:\"\S+\"\, \"ProviderGuid\"\:\"\\d+\-\d+\-\d+\-\S+\-\S+\\"\,\"Version\"\:\d+\, \"Task\"\:\d+\,\"OpcodeValue\"\:\d+\,\"RecordNumber\"\:\d+\,\"ActivityID \"\:\"\\d+\-\S+\-\d+\-\S+\-\S+\\"\,\"ProcessID\"\:\d+\,\"ThreadID\"\:\d+\, \"Channel\"\:\"\S+\"\,\"Message\"\:\"\S+ \S+ \S+ \S+ \S+ \S+ desc=An account failed to log on action=write alert_file NIL * 1 * Failed login attempt detected on $2 machine at $1 |
6.4. Detection of MAC Flooding Attack
{"MessageSourceAddress":"192.168.99.2","EventReceivedTime":"2023-07-12 12:18:12", "SourceModuleName":"udp_two","SourceModuleType":"im_udp", "SyslogFacilityValue":23,"SyslogFacility":"LOCAL7","SyslogSeverityValue":5, "SyslogSeverity":"NOTICE","SeverityValue":2,"Severity":"INFO","Hostname": "DellN2048-1","EventTime":"2023-07-12 12:18:44","SourceName":"TRAPMGR", "ProcessID":"dtlAddrTask","Message":"traputil.c(763) 2001489 %% MAC Lock Violation: Gi1/0/18 , 3c:2c:30:c2:ce:b9, vlan 1","Platform":"Switch"} |
type=Single ptype=RegExp pattern=\{\"MessageSourceAddress\"\:\"(\d+\.\d+\.\d+\.\d+)\"\, \"EventReceivedTime\"\:\"(\d+\-\d+\-\d+ \d+\:\d+\:\d+)\"\, \"SourceModuleName\"\:\"\S+\"\,\"SourceModuleType\"\:\"\S+\"\, \"SyslogFacilityValue\"\:\d+\,\"SyslogFacility\"\:\"\S+\"\, \"SyslogSeverityValue\"\:\d+\,\"SyslogSeverity\"\:\"\S+\"\,\"SeverityValue\ "\:\d+\,\"Severity\"\:\"\S+\"\,\"Hostname\"\:\"\S+\"\,\"EventTime\"\: \"\d+\-\d+\-\d+ \d+\:\d+\:\d+\"\,\"SourceName\"\:\"\S+\"\,\"ProcessID\"\: \"\S+\"\,\"Message\"\:\"\S+ \d+ %% MAC Lock Violation\: \S+ \, \S+\:\S+\:\S+\:\S+\:\S+\:\S+\, \S+ \d+\"\,\"Platform\"\:\"\S+\"\} desc=Detection of Switch MAC flooding attack action=write alert_file MAC flooding attack detected on $2 machine at $1 |
6.5. Detection of STP Root Take-Over Attack
{"MessageSourceAddress":"192.168.99.2","EventReceivedTime":"2023-07-12 14:48:39" , "SourceModuleName":"udp_two","SourceModuleType":"im_udp", "SyslogFacilityValue":23,"SyslogFacility":"LOCAL7","SyslogSeverityValue":3, "SyslogSeverity":"ERR","SeverityValue":4,"Severity":"ERROR","Hostname": "DellN2048-1","EventTime":"2023-07-12 14:49:11","SourceName":"DOT1S", "ProcessID":"dtlTask","Message":"dot1s_txrx.c(269) 9033062 %% dot1sBpduReceive(): Discarding the BPDU, since it is an invalid BPDU type","Platform":"Switch"} |
type=Single ptype=RegExp pattern=\{\"MessageSourceAddress\"\:\"(\d+\.\d+\.\d+\.\d+)\"\, \"EventReceivedTime\"\:\"(\d+\-\d+\-\d+ \d+\:\d+\:\d+)\"\, \"SourceModuleName\"\:\"\S+\"\,\"SourceModuleType\"\:\"\S+\"\, \"SyslogFacilityValue\"\:\d+\,\"SyslogFacility\"\:\"\S+\"\, \"SyslogSeverityValue\"\:\d+\,\"SyslogSeverity\"\:\"\S+\"\,\"SeverityValue\"\: \d+\,\"Severity\"\:\"\S+\"\,\"Hostname\"\:\"\S+\"\,\"EventTime\"\:\"\d+\- \d+\-\d+ \d+\:\d+\:\d+\"\,\"SourceName\"\:\"\S+\"\,\"ProcessID\"\:\"\S+ \"\,\"Message\"\:\"\S+ \d+ %% dot1sBpduReceive\( since it is an invalid BPDU type\"\,\"Platform\"\:\"\S+\"\} desc=Detection of Switch STP Root change attack action=write alert_file STP Root change attack detected on $1 machine at $2 |
7. Correlating Multiple Devices Logs
- First, the DoS attack traffic, after being generated by the PC-1 machine, is routed through the switch and reaches the PC-2 target machine. The PC-2 machine, running an Apache server-based application vulnerable to DoS attacks, generates logs related to this DoS attack traffic. Consequently, logs related to the DoS attack are generated on the victim machine, as shown below.
[Mon Apr 13 10:15:33.582048 2023] [mpm_winnt:error] [pid 1196:tid 4020]
AH00326: Server ran out of threads to serve requests. Consider raising the
ThreadPerChild setting - Second, mirror traffic is forwarded from a switch port to the SIEM system machine running Snort IDS. Snort IDS detects the DoS attack originating from the PC-1 machine to the PC-2 machine using predefined rules, generating an alert or log, as shown below. This alert is then sent to the SIEM system for analysis and correlation by the correlation engine.
04/13-10:15:33.584030 [**] [1:1000001:1] DoS attack detected. [**] [Classification:
DoS attack event] [Priority: 3] TCP 192.168.99.10 -> 192.168.99.20
8. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Tan, Y.; Li, X. The impact of internet on entrepreneurship. Int. Rev. Econ. Financ. 2022, 77, 135–142. [Google Scholar] [CrossRef]
- Ghobakhloo, M. Industry 4.0, digitization, and opportunities for sustainability. J. Clean. Prod. 2020, 252, 119869. [Google Scholar] [CrossRef]
- Sony, M.; Naik, S. Key ingredients for evaluating Industry 4.0 readiness for organizations: A literature review. Benchmarking Int. J. 2020, 27, 2213–2232. [Google Scholar] [CrossRef]
- Alqahtani, A.; Sheldon, F.T. A survey of crypto ransomware attack detection methodologies: An evolving outlook. Sensors 2022, 22, 1837. [Google Scholar] [CrossRef] [PubMed]
- Chowdhury, A. Recent cyber security attacks and their mitigation approaches—An overview. In Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, 26–28 October 2016; Proceedings 7; Springer: Berlin/Heidelberg, Germany, 2016; pp. 54–65. [Google Scholar]
- Hwang, W.S.; Shon, J.G.; Park, J.S. Web Session Hijacking Defense Technique Using User Information. Hum.-Centric Comput. Inf. Sci. 2022, 12, 16. [Google Scholar]
- Tang, D.; Dai, R.; Tang, L.; Li, X. Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis. Hum.-Centric Comput. Inf. Sci. 2020, 10, 6. [Google Scholar] [CrossRef]
- Saleem, S.; Sheeraz, M.; Hanif, M.; Farooq, U. Web server attack detection using machine learning. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 20–21 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–7. [Google Scholar]
- Yang, Y.; Wei, X.; Xu, R.; Wang, W.; Peng, L.; Wang, Y. Jointly beam stealing attackers detection and localization without training: An image processing viewpoint. Front. Comput. Sci. 2023, 17, 173704. [Google Scholar] [CrossRef]
- Han, Z.; Yang, Y.; Bilal, M.; Wang, W.; Krichen, M.; Alsadhan, A.A.; Ge, C. Smart optimization solution for channel access attack defense under UAV-aided heterogeneous network. IEEE Internet Things J. 2023, 10, 18890–18897. [Google Scholar] [CrossRef]
- Urooj, U.; Al-rimy, B.A.S.; Zainal, A.; Ghaleb, F.A.; Rassam, M.A. Ransomware detection using the dynamic analysis and machine learning: A survey and research directions. Appl. Sci. 2022, 12, 172. [Google Scholar] [CrossRef]
- Kshetri, N.; Voas, J. Ransomware: Pay to play? Computer 2022, 55, 11–13. [Google Scholar] [CrossRef]
- Ahmed, S.A.; Haq, A.U.; Sheeraz, M.; Durad, M.H. Design and Development of Cloud based QR Coded Watermarking DLP system. In Proceedings of the 2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 16–20 August 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 696–701. [Google Scholar]
- Paracha, M.A.; Sheeraz, M.; Chai, Y.; Ahmad, S.; Khan, Z.N.; Hussain, S.; Aftab-Ul-Haq; Durad, M.H. Implementation of Two Layered DLP Strategies. In Proceedings of the 2022 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 7–8 December 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 8–13. [Google Scholar]
- Tcydenova, E.; Kim, T.W.; Lee, C.; Park, J.H. Detection of adversarial attacks in ai-based intrusion detection systems using explainable AI. Hum.-Centric Comput. Inf. Sci. 2021, 11, 35. [Google Scholar] [CrossRef]
- Sheeraz, M.; Durad, H.; Tahir, S.; Tahir, H.; Saeed, S.; Almuhaideb, A.M. Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring. IEEE Access 2024, 12, 61848–61859. [Google Scholar] [CrossRef]
- Wang, W.; Yang, Y.; Khan, L.U.; Niyato, D.; Han, Z.; Guizani, M. Digital Twin for Wireless Networks: Security Attacks and Solutions. IEEE Wirel. Commun. 2023, 31, 278–285. [Google Scholar] [CrossRef]
- Alzahrani, A. Coronavirus social engineering attacks: Issues and recommendations. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 154–161. [Google Scholar] [CrossRef]
- Alkhalil, Z.; Hewage, C.; Nawaf, L.; Khan, I. Phishing attacks: A recent comprehensive study and a new anatomy. Front. Comput. Sci. 2021, 3, 563060. [Google Scholar] [CrossRef]
- Laue, T.; Klecker, T.; Kleiner, C.; Detken, K.O. A SIEM Architecture for Advanced Anomaly Detection. Open J. Big Data 2022, 6, 26–42. [Google Scholar]
- Kumar, R.; Shinde, P.R. Computer Network-IP Address & Subnetting. Int. J. Eng. Adv. Technol. 2016, 5, 242–246. [Google Scholar]
- Singh, D. Internet Protocol (IP) Address–Subnetting and Supernetting. Int. J. Emerg. Trends Technol. Comput. Sci. 2015, 4, 87–90. [Google Scholar]
- Cruz, M.S.; de Franco Rosa, F.; Jino, M. A Study on Ontologies of Vulnerabilities and Attacks on VLAN. In Proceedings of the ITNG 2021 18th International Conference on Information Technology-New Generations, Las Vegas, NV, USA, 10–14 April 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 115–119. [Google Scholar]
- Miloslavskaya, N. Designing blockchain-based SIEM 3.0 system. Inf. Comput. Secur. 2018, 26, 491–512. [Google Scholar] [CrossRef]
- Sheeraz, M.; Paracha, M.A.; Haque, M.U.; Durad, M.H.; Mohsin, S.M.; Band, S.S.; Mosavi, A. Effective Security Monitoring Using Efficient SIEM Architecture. Hum.-Centric Comput. Inf. Sci. 2023, 13, 17. [Google Scholar]
- Laue, T.; Kleiner, C.; Detken, K.O.; Klecker, T. A SIEM architecture for multidimensional anomaly detection. In Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Virtual Conference, 22–25 September 2021; IEEE: Piscataway, NJ, USA, 2021; Volume 1, pp. 136–142. [Google Scholar]
- Skendžić, A.; Kovačić, B.; Balon, B. Management and Monitoring Security Events in a Business Organization-SIEM system. In Proceedings of the 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 23–27 May 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1203–1208. [Google Scholar]
- González-Granadillo, G.; González-Zarzosa, S.; Diaz, R. Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures. Sensors 2021, 21, 4759. [Google Scholar] [CrossRef] [PubMed]
- Negi, C.S.; Kumari, N.; Kumar, P.; Sinha, S.K. An Approach for Alert Correlation Using ArcSight SIEM and Open Source NIDS. In Proceedings of Fifth International Conference on Microelectronics, Computing and Communication Systems: MCCS 2020; Springer: Singapore, 2021; pp. 29–40. [Google Scholar]
- Kotenko, I.; Fedorchenko, A.; Doynikova, E. Data analytics for security management of complex heterogeneous systems: Event correlation and security assessment tasks. In Advances in Cyber Security Analytics and Decision Systems; Springer: Cham, Switzerland, 2020; pp. 79–116. [Google Scholar]
- Levshun, D.; Kotenko, I. A survey on artificial intelligence techniques for security event correlation: Models, challenges, and opportunities. Artif. Intell. Rev. 2023, 56, 8547–8590. [Google Scholar] [CrossRef]
- Muhammad, A.R.; Sukarno, P.; Wardana, A.A. Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning. Procedia Comput. Sci. 2023, 217, 1406–1415. [Google Scholar] [CrossRef]
- Šuškalo, D.; Morić, Z.; Redžepagić, J.; Regvart, D. Comparative analysis of ibm qradar and wazuh for security information and event management. Ann. DAAAM Proc. 2023, 34, 0096–0102. [Google Scholar] [CrossRef]
- Sadowski, G.; Kavanagh, K.; Bussa, T. Critical capabilities for security information and event management. In Gartner Group Research Note; Gartner: Stamford, CT, USA, 2020. [Google Scholar]
- Olaniyan, R.; Rakshit, S.; Vajjhala, N.R. Application of user and entity behavioral analytics (UEBA) in the detection of cyber threats and vulnerabilities management. In Computational Intelligence for Engineering and Management Applications: Select Proceedings of CIEMA 2022; Springer: Berlin/Heidelberg, Germany, 2023; pp. 419–426. [Google Scholar]
- Subramanian, K.; Subramanian, K. Introducing the Splunk Platform. In Practical Splunk Search Processing Language: A Guide for Mastering SPL Commands for Maximum Efficiency and Outcome; Apress: Berkeley, CA, USA, 2020; pp. 1–38. [Google Scholar]
- Svoboda, T.; Horalek, J.; Sobeslav, V. Behavioral analysis of SIEM solutions for energy technology systems. In Context-Aware Systems and Applications, and Nature of Computation and Communication: 9th EAI International Conference, ICCASA 2020, and 6th EAI International Conference, ICTCC 2020, Thai Nguyen, Vietnam, 26–27 November 2020; Proceedings 9; Springer: Berlin/Heidelberg, Germany, 2021; pp. 265–276. [Google Scholar]
- Vaarandi, R.; Blumbergs, B.; Çalışkan, E. Simple event correlator-best practices for creating scalable configurations. In Proceedings of the 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision, San Diego, CA, USA, 21–25 March 2016; IEEE: Piscataway, NJ, USA, 2015; pp. 96–100. [Google Scholar]
- Ortiz, G.; Bazan-Muñoz, A.; Lamersdorf, W.; Garcia-de Prado, A. Evaluating the integration of Esper complex event processing engine and message brokers. PeerJ Comput. Sci. 2023, 9, e1437. [Google Scholar] [CrossRef] [PubMed]
- Wen, Q. Drools Rules Engine Used in Management Accounting System Design Research. In Proceedings of the 2023 4th International Conference on Management Science and Engineering Management (ICMSEM 2023), Nanchang, China, 2–4 June 2023; Atlantis Press: Amsterdam, The Netherlands, 2023; pp. 1604–1610. [Google Scholar]
- Rosa, L.; Alves, P.; Cruz, T.; Simões, P.; Monteiro, E. A comparative study of correlation engines for security event management. In Proceedings of the ICCWS 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa, 24–25 March 2015; p. 277. [Google Scholar]
- Waidyarathna, D.; Nayantha, W.; Wijesinghe, W.; Abeywardena, K.Y. Intrusion detection system with correlation engine and vulnerability assessment. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 365–370. [Google Scholar] [CrossRef]
- Teixeira, D.; Assunção, L.; Pereira, T.; Malta, S.; Pinto, P. OSSEC IDS extension to improve log analysis and override false positive or negative detections. J. Sens. Actuator Netw. 2019, 8, 46. [Google Scholar] [CrossRef]
- Bezas, K.; Filippidou, F. Comparative Analysis of Open Source Security Information & Event Management Systems (SIEMs). Indones. J. Comput. Sci. 2023, 12, 443–468. [Google Scholar]
- Larriva-Novo, X.; Vega-Barbas, M.; Villagrá, V.A.; Rivera, D.; Sanz, M.; Álvarez-Campana, M. Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations. In Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, 25–28 August 2020; pp. 1–9. [Google Scholar]
- Ahlgren, V.; Andersson, S.; Brandt, J.; Cardo, N.; Chunduri, S.; Enos, J.; Fields, P.; Gentile, A.; Gerber, R.; Gienger, M.; et al. Large-scale system monitoring experiences and recommendations. In Proceedings of the 2018 IEEE International Conference on Cluster Computing (CLUSTER), Belfast, UK, 10–13 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 532–542. [Google Scholar]
- Vaarandi, R.; Blumbergs, B.; Kont, M. An unsupervised framework for detecting anomalous messages from syslog log files. In Proceedings of the NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Väisänen, T.; Noponen, S.; Latvala, O.M.; Kuusijärvi, J. Combining real-time risk visualization and anomaly detection. In Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, Madrid, Spain, 24–28 September 2018; pp. 1–7. [Google Scholar]
- Vaarandi, R.; Grimaila, M.R. Security event processing with simple event correlator. Inf. Syst. Secur. Assoc. J. 2012, 10, 30–37. [Google Scholar]
- Myers, J.; Grimaila, M.R.; Mills, R.F. Log-based distributed security event detection using simple event correlator. In Proceedings of the 2011 44th Hawaii International Conference on System Sciences, Washington, DC, USA, 4–7 January 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–7. [Google Scholar]
- Dwivedi, N.; Tripathi, A. Event correlation for intrusion detection systems. In Proceedings of the 2015 IEEE International Conference on Computational Intelligence & Communication Technology, Ghaziabad, India, 13–14 February 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 133–139. [Google Scholar]
- Ficco, M.; Daidone, A.; Coppolino, L.; Romano, L.; Bondavalli, A. An event correlation approach for fault diagnosis in scada infrastructures. In Proceedings of the 13th European Workshop on Dependable Computing, Pisa, Italy, 11–12 May 2011; pp. 15–20. [Google Scholar]
- Ambre, A.; Shekokar, N. Insider threat detection using log analysis and event correlation. Procedia Comput. Sci. 2015, 45, 436–445. [Google Scholar] [CrossRef]
- Shuai, L.; Li, S. Performance optimization of Snort based on DPDK and Hyperscan. Procedia Comput. Sci. 2021, 183, 837–843. [Google Scholar] [CrossRef]
- Wang, X.; Hong, Y.; Chang, H.; Park, K.; Langdale, G.; Hu, J.; Zhu, H. Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs. In Proceedings of the NSDI, Boston, MA, USA, 26–28 February 2019; Volume 19, pp. 631–648. [Google Scholar]
- Kapoor, M.; Fuchs, G.; Quance, J. Rexactor: Automatic regular expression signature generation for stateless packet inspection. In Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23–26 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–9. [Google Scholar]
- Colmenar Lamas, F. Analysis and Comparison of Log Shipment Solutions at AWS S3 for Windows 10. Master’s Thesis, University of Twente, Enschede, The Netherlands, 2021. [Google Scholar]
- Tripathi, N.; Hubballi, N. Application layer denial-of-service attacks and defense mechanisms: A survey. ACM Comput. Surv. 2021, 54, 1–33. [Google Scholar] [CrossRef]
- Cruz, M.S.; de Franco Rosa, F.; Jino, M. Ontology of Vulnerabilities and Attacks on VLAN. In Proceedings of the International Conference on Information Technology-New Generations, Las Vegas, NV, USA, 24–26 April 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 89–95. [Google Scholar]
- Paul, S. Block the Root Takeover: Validating Devices Using Blockchain Protocol. 2021. Available online: https://scholar.dsu.edu/theses/364/ (accessed on 1 June 2024).
Correlation Engine | Development Platform | Memory Requirement | Platform Dependency | Usability |
---|---|---|---|---|
SEC [38] | Perl | Low | Independent | Easy |
Esper [39] | Java and .Net | High | Both | Easy |
Drools [40] | Java | High | Independent | Complex |
NodeBrain [41] | C | Low | Dependent | Complex |
Prelude [42] | Python | Low | Independent | Complex |
OSSEC [43] | C | Low | Dependent | Easy |
OSSIM [44] | C | Low | Dependent | Complex |
Feature | SEC | Proposed OC |
---|---|---|
Engine type | Rule-base | Rule-base |
Development environment | Perl | C |
Application model | Single-threaded | Multi-threaded |
Parallelism | No | Yes |
Architecture requirement | No | SIMD |
Rules processing | Sequential access | Parallel access |
Data processing | Single data blocks | Multiple data block |
Matching mechanism | Sequential regex matching | Parallel pattern matching |
Core matching technique | Perl regex matching | Hyperscan |
Feature | Setting/Value |
---|---|
Processor | Intel(R) Core(TM) i7-8550U |
[email protected] GHz 2.00 GHz | |
RAM | 8 GB |
VM OS | CentOS 7 |
VM RAM | 4 GB |
No. of Processors (VM) | 04 |
Attack Type | Targeted OSI Layer | Detection Status |
---|---|---|
Simple GoldenEye DoS | Application | Detected |
Random GoldenEye DoS | Application | Detected |
Slow HTTP DoS | Application | Detected |
SlowLoris DoS | Application | Detected |
FTP | Application | Detected |
Failed Login | Application | Detected |
MAC Flooding | Data-Link | Detected |
STP Root Take Over | Data-Link | Detected |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sheeraz, M.; Durad, M.H.; Paracha, M.A.; Mohsin, S.M.; Kazmi, S.N.; Maple, C. Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection. Sensors 2024, 24, 4901. https://doi.org/10.3390/s24154901
Sheeraz M, Durad MH, Paracha MA, Mohsin SM, Kazmi SN, Maple C. Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection. Sensors. 2024; 24(15):4901. https://doi.org/10.3390/s24154901
Chicago/Turabian StyleSheeraz, Muhammad, Muhammad Hanif Durad, Muhammad Arsalan Paracha, Syed Muhammad Mohsin, Sadia Nishat Kazmi, and Carsten Maple. 2024. "Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection" Sensors 24, no. 15: 4901. https://doi.org/10.3390/s24154901
APA StyleSheeraz, M., Durad, M. H., Paracha, M. A., Mohsin, S. M., Kazmi, S. N., & Maple, C. (2024). Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection. Sensors, 24(15), 4901. https://doi.org/10.3390/s24154901