2012
DOI: 10.1504/ijesdf.2012.048412
|View full text |Cite
|
Sign up to set email alerts
|

An ontology-driven approach to model SIEM information and operations using the SWRL formalism

Abstract: International audienceThe management of security events, from the risk analysis, to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, the fact that network and system devices are heterogeneous, increases the difficulty of these administrative tasks. This paper introduces an ontology-driven approach to address the aforementioned problems. The proposed model takes into account two aspects: the information and the operations that are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In general we note that, while each model is targeted toward a specific purpose (the goal in [14] is to annotate web resources, while [13] attempts to expand the representation to general computer security, and [12] models a security information and event management (SIEM) system), most adopt a general structure similar to that shown in Figure 1.…”
Section: ) Demonstrate the Development Of Automated Idrsmentioning
confidence: 99%
“…In general we note that, while each model is targeted toward a specific purpose (the goal in [14] is to annotate web resources, while [13] attempts to expand the representation to general computer security, and [12] models a security information and event management (SIEM) system), most adopt a general structure similar to that shown in Figure 1.…”
Section: ) Demonstrate the Development Of Automated Idrsmentioning
confidence: 99%
“…Their deployment thus focuses, firstly, on writing ad hoc collectors and translators to acquire information and normalize it, and secondly, on writing correlation rules to aggregate the information and reduce the amount of data. This operational focus leads SIEM implementers to prioritize syntax over semantics, and to use correlation languages that are poor in terms of features [ 73 ]. However, as the number of attacks, and thus the diversity of alerts received by SIEMs increases, the need for appropriate treatment of these alerts has become essential.…”
Section: Limitations Of Current Siemsmentioning
confidence: 99%
“…To allow time based correlation, e.g. to check if specific events such as a failed login occurred several times within the last ten minutes, the ontology is structured according to the approach of Granadillo et al [4] on the top level of the ontology. The approach suggests to separate the ontology into two parts, the (static) information and the (dynamic) operations as shown in Fig.…”
Section: Architecture Of the Systemmentioning
confidence: 99%