Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino
{"title":"The Applicability of a SIEM Solution: Requirements and Evaluation","authors":"Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino","doi":"10.1109/WETICE.2019.00036","DOIUrl":null,"url":null,"abstract":"The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of systems. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. A significant factor for the increasing adoption of SIEMs is the capabilities that such systems offer, being able to provide near-real time analysis of security alerts and logs generated from various set of sources within an organization IT infrastructure. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization; the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting the most suitable SIEM solution; it suggests technical and organizational requirements that should be addressed and examines the SIEM applicability using quantitative and qualitative evaluation criteria.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2019.00036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of systems. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. A significant factor for the increasing adoption of SIEMs is the capabilities that such systems offer, being able to provide near-real time analysis of security alerts and logs generated from various set of sources within an organization IT infrastructure. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization; the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting the most suitable SIEM solution; it suggests technical and organizational requirements that should be addressed and examines the SIEM applicability using quantitative and qualitative evaluation criteria.