首页> 外文期刊>Information management & computer security >Designing blockchain-based SIEM 3.0 system
【24h】

Designing blockchain-based SIEM 3.0 system

机译:设计基于区块链的SIEM 3.0系统

获取原文
获取原文并翻译 | 示例
           

摘要

Purpose - Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated in real-time from an IS incident viewpoint, to identify an incident's source, consider its type, weigh its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. Different security information and event management (SIEM) systems cope with this routine and usually complicated work by rapid detection of IS incidents and further appropriate response. Modern challenges dictate the need to build these systems using advanced technologies such as the blockchain (BC) technologies (BCTs). The purpose of this study is to design a new BC-based SIEM 3.0 system and propose a methodology for its evaluation. Design/methodology/approach - Modern challenges dictate the need to build these systems using advanced technologies such as the BC technologies. Many internet resources argue that the BCT suits the intrusion detection objectives very well, but they do not mention how to implement it. Findings - After a brief analysis of the BC concept and the evolution of SIEM systems, this paper presents the main ideas on designing the next-generation BC-based SIEM 3.0 systems, for the first time in open access publications, including a convolution method for solving the scalability issue for evergrowing BC size. This new approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. Research limitations/implications - The most important area of the future work is to bring this proposed system to life. The implementation, deployment and testing onto a real-world network would also allow people to see its viability or show that a more sophisticated model should be worked out. After developing the design basics, we are ready to determine the directions of the most promising studies. What are the main criteria and principles, according to which the organization will select events from PEL for creating one BC block? What is the optima) number of nodes in the organization's BC, depending on its network assets, services provided and the number of events that occur in its network? How to build and host the SIEM 3.0 BC infrastructure? How to arrange streaming analytics of block's content containing events taking place in the network? How to design the BC middleware as software that enables staff to interact with BC blocks to provide services like IS events correlation? How to visualize the results obtained to find insights and patterns in historical BC data for better IS management? How to predict the emergence of IS events in the future? This list of questions can be continued indefinitely for a full-fledged design of SIEM 3.0. Practical implications - This paper shows the full applicability of the BC concept to the creation of the next-generation SIEM 3.0 systems that are designed to detect IS incidents in a modern, fully interconnected organization's network environment. The authors' attempt to begin with a detailed description of the basics for a BC-based SIEM 3.0 system design is presented, as well as the evaluation methodology for the resulting product. Originality/value - The authors believe that their new revolutionary approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. They hope that this paper will evoke a lively response in this segment of the security controls market from both theorists and direct developers of living systems that will implement the above approach.
机译:目的-如今,为了安全,合法地运营并实现业务目标,保护有价值的资产并支持不中断的业务流程,所有组织都需要匹配许多内部和外部合规性法规,例如法律,标准,准则,政策,规范和程序。前所未有地需要一种能够管理新网络空间中其Intranet的信息安全(IS),同时处理各种格式的海量IS相关数据的集成系统。这些数据在收集和分析之后,应从IS事件观点进行实时评估,以识别事件的来源,考虑其类型,权衡其后果,可视化其向量,关联所有目标系统,确定对策的优先级并提供缓解措施具有加权影响相关性的解决方案。不同的安全信息和事件管理(SIEM)系统通过快速检测IS事件和进一步的适当响应来应对这种例行的,通常是复杂的工作。现代挑战表明,需要使用诸如区块链(BC)技术(BCT)等先进技术来构建这些系统。这项研究的目的是设计一个新的基于BC的SIEM 3.0系统,并提出一种评估方法。设计/方法/方法-现代挑战要求使用BC技术等先进技术来构建这些系统。许多Internet资源争辩说BCT非常适合入侵检测目标,但是他们没有提到如何实现它。调查结果-在简要分析了BC概念和SIEM系统的发展之后,本文首次在开放获取出版物中提出了设计下一代基于BC的SIEM 3.0系统的主要思想,包括卷积方法。解决了不断增长的BC大小的可伸缩性问题。这种新方法使我们不仅可以简单地以演进的方式修改SIEM系统,而且还可以在质量上将其下一代产品带入更高水平的IS事件管理。研究局限性/意义-未来工作中最重要的领域是使拟议的系统付诸实践。在实际网络上的实施,部署和测试也将使人们看到其可行性,或者表明应该制定出更复杂的模型。开发设计基础之后,我们准备确定最有前途的研究方向。根据哪些主要标准和原则,组织将从PEL中选择事件以创建一个BC块?根据组织的网络资产,所提供的服务以及网络中发生的事件数,组织的BC中的最佳节点数是多少?如何构建和托管SIEM 3.0 BC基础架构?如何安排包含网络中发生的事件的块内容的流分析?如何将BC中间件设计为使员工能够与BC块进行交互以提供IS事件关联等服务的软件?如何可视化获得的结果,以便在BC历史数据中找到见解和模式,以便更好地进行IS管理?如何预测未来IS事件的出现?对于SIEM 3.0的完整设计,可以无限地继续列出这些问题。实际意义-本文展示了BC概念在创建下一代SIEM 3.0系统中的完全适用性,该系统旨在检测现代,完全互连的组织网络环境中的IS事件。本文作者试图详细介绍基于BC的SIEM 3.0系统设计的基本知识,以及对所得产品的评估方法。原创性/价值-作者们认为,他们的新革命性方法使我们不仅可以简单地以进化的方式修改SIEM系统,而且还可以将其下一代产品带入更高质量的IS事件管理水平。他们希望本文能够引起实施上述方法的理论家和直接开发者的积极响应,在安全控制市场的这一领域。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号