Trends of SOC & SIEM Technology for Cybersecurity |
Cha, ByungRae
(호남대학교 정보통신공학과)
Choi, MyeongSoo (제노테크(주)) Kang, EunJu (호남대학교 정보통신공학과) Park, Sun (광주과학기술원 전기전자컴퓨터공학부) Kim, JongWon (광주과학기술원 전기전자컴퓨터공학부) |
1 | "실시간 탐지와 빅데이터 분석을 하나로 - 보안 재앙 막는 최전선 컨트롤 타워 'SIEM'," IDG, 2017년 1월 26일 |
2 | 김진보, 김미선, 서재현, "사물인터넷 서비스 접근 제어를 위한 리소스 서비스 관리 모델 구현," 스마트미디어저널, Vol. 5, no.3, pp.9-16, 2016년 9월 |
3 | NIST, "Framework for Improving Critical Infrastructure Cybersecurity," Draft Version 1.1, Jan. 10, 2017. |
4 | Stef Schinag, Keith Schoon, and Ronald Paans, "A framework for designing a Security Operations Centre (SOC)," 2015 48th Hawaii International Conference on System Sciences, 2015, pp.2253-2262. |
5 | Alissa Torres, "Building a World-Class Security Operations Center: A Roadmap," SANS, 2015. |
6 | Cisco's OpenSOC, http://opensoc.github.io/ |
7 | IBM's Security Operation Operating Model, http://portland.issa.org/wp-content/uploads/2015/03/IBM-SIEM-Security-and-SOC-Optimization.pdf |
8 | Apache Metron, http://metron.incubator.apache.org/ |
9 | S. Bhatt, P. K. Manadhata, and L. Zomlot, "The operational role of security information and event management systems," IEEE Security & Privacy, vol. 12, no. 5, 2014. |
10 | ENISA (European Union Agency for Network and Information Security), https://www.enisa.europa.eu/ |
11 | Mosaic Security Research, "Log Management & Security Information and Event Management (SIEM) Software Guide," Mosaic Security Research, (accessed May 2014). |
12 | Kelly M. Kavanagh, Oliver Rochford, Toby Bussa, "2016 Magic Quadrant for SIEM," Aug. 2016. |
13 | ITU-T (Telecommunication Standardization Sector of the International Telecommunications Union), "Common Requirements of Internet of Things," Y.2066, June 2014. |
14 | LogRhythm, https://logrhythm.com/. |
15 | Splunk, https://www.splunk.com/. |