Browse > Article

Trends of SOC & SIEM Technology for Cybersecurity  

Cha, ByungRae (호남대학교 정보통신공학과)
Choi, MyeongSoo (제노테크(주))
Kang, EunJu (호남대학교 정보통신공학과)
Park, Sun (광주과학기술원 전기전자컴퓨터공학부)
Kim, JongWon (광주과학기술원 전기전자컴퓨터공학부)
Publication Information
Smart Media Journal / v.6, no.4, 2017 , pp. 41-49 More about this Journal
Abstract
According to the occurrence of many security incidents, the SOC(Security Operation Center) and SIEM(Security Information & Event Management) are concentrated recently. The various studies and commercial products of the information security industry are being released. As reflected in this situation, NIST in the US is publishing and revising the document about the Cybersecurity Framework. In this study, we investigated the NIST's Cyberseurity Framework, trends in SOC and SIEM security technologies and solutions, and also introduce the open source Apache Metron of a real-time Bigdata security tool.
Keywords
Cybersecurity Framework; SOC(Security Operation Center); SIEM(Security Information & Event Management); NIST(National Institute of Standards and Technology);
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 "실시간 탐지와 빅데이터 분석을 하나로 - 보안 재앙 막는 최전선 컨트롤 타워 'SIEM'," IDG, 2017년 1월 26일
2 김진보, 김미선, 서재현, "사물인터넷 서비스 접근 제어를 위한 리소스 서비스 관리 모델 구현," 스마트미디어저널, Vol. 5, no.3, pp.9-16, 2016년 9월
3 NIST, "Framework for Improving Critical Infrastructure Cybersecurity," Draft Version 1.1, Jan. 10, 2017.
4 Stef Schinag, Keith Schoon, and Ronald Paans, "A framework for designing a Security Operations Centre (SOC)," 2015 48th Hawaii International Conference on System Sciences, 2015, pp.2253-2262.
5 Alissa Torres, "Building a World-Class Security Operations Center: A Roadmap," SANS, 2015.
6 Cisco's OpenSOC, http://opensoc.github.io/
7 IBM's Security Operation Operating Model, http://portland.issa.org/wp-content/uploads/2015/03/IBM-SIEM-Security-and-SOC-Optimization.pdf
8 Apache Metron, http://metron.incubator.apache.org/
9 S. Bhatt, P. K. Manadhata, and L. Zomlot, "The operational role of security information and event management systems," IEEE Security & Privacy, vol. 12, no. 5, 2014.
10 ENISA (European Union Agency for Network and Information Security), https://www.enisa.europa.eu/
11 Mosaic Security Research, "Log Management & Security Information and Event Management (SIEM) Software Guide," Mosaic Security Research, (accessed May 2014).
12 Kelly M. Kavanagh, Oliver Rochford, Toby Bussa, "2016 Magic Quadrant for SIEM," Aug. 2016.
13 ITU-T (Telecommunication Standardization Sector of the International Telecommunications Union), "Common Requirements of Internet of Things," Y.2066, June 2014.
14 LogRhythm, https://logrhythm.com/.
15 Splunk, https://www.splunk.com/.