2012
DOI: 10.1108/09685221211267639
|View full text |Cite
|
Sign up to set email alerts
|

SIEM‐based framework for security controls automation

Abstract: Article information:To cite this document: Raydel Montesino, Stefan Fenz, Walter Baluja, (2012),"SIEM-based framework for security controls automation"

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
2

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 17 publications
0
10
0
2
Order By: Relevance
“…NIST SP 800-53 enabled these goals to be met through the streamlining of existing practices and improving documentation. The scalable nature of NIST CSF was applicable to the differing scope and IT requirements of each department within the University SIEM-based framework for security controls automation [26] The potential of using SIEM technology is investigated with the aim of maximising security-control automation. For the security controls identified in NIST SP 800-53, approximately 30% of these controls were considered as having the capability of automation control.…”
Section: Related Frameworkmentioning
confidence: 99%
“…NIST SP 800-53 enabled these goals to be met through the streamlining of existing practices and improving documentation. The scalable nature of NIST CSF was applicable to the differing scope and IT requirements of each department within the University SIEM-based framework for security controls automation [26] The potential of using SIEM technology is investigated with the aim of maximising security-control automation. For the security controls identified in NIST SP 800-53, approximately 30% of these controls were considered as having the capability of automation control.…”
Section: Related Frameworkmentioning
confidence: 99%
“…Moreover, as can be seen in Figure 3 , the two intrusion detection engines are included in a SIEM, which have to be deployed within the city council network premises. In the enterprise context, system administrators are successfully using SIEM technology to reduce the complexity of the security administration and to automate certain tasks and security controls, such as log management, system monitoring, malware protection, vulnerability scanning, security configuration assessment and incident management [ 27 ]. Furthermore, SIEM systems offer big data collection, storage and processing services, and therefore, this guarantees the scalability of the framework’s architecture.…”
Section: Intrusion Detection Frameworkmentioning
confidence: 99%
“…There is no exact definition for SIM, but relevant sources explain it from several different perspectives. One of possible aspects was brought by Montesion, Fenz a Baluja [1], who defined SIM as:…”
Section: A Sim and Semmentioning
confidence: 99%
“…Each SIEM system has a method for data normalization, its own process for creating evaluation rules. A common feature of these rules is presence of boolean type [1]. Complex rules can be created by combination of two or more partial rules.…”
Section: ) Correlation Enginementioning
confidence: 99%