Mobile agent-based SIEM for event collection and normalization externalization
Purpose: This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and normalization on the source device. The externalization of the normalization process, executed by several distributed mobile agents on interconnected computers and devices, proposes a SIEM server dedicated mainly for correlation and analysis. Design/methodology/approach: The architecture has been proposed in three stages. In the first step, the authors described the different aspects of the proposed approach. Then they implemented the proposed architecture and presented a new vision for the insertion of normalized data into the SIEM database. Finally, the authors performed a numerical comparison between the approach used in the proposed architecture and that of existing SIEM systems. Findings: The results of the experiments showed that MA-SIEM systems are more efficient than existing SIEM systems because they leave the SIEM resources primarily dedicated to advanced correlation analysis. In addition, this paper takes into account realistic scenarios and use-cases and proposes a fully automated process for transferring normalized events in near real time to the SIEM server for further analysis using mobile agents. Originality/value: The work provides new insights into the normalization security-related events using light mobile agents.
Year of publication: |
2019
|
---|---|
Authors: | Moukafih, Nabil ; Orhanou, Ghizlane ; Elhajji, Said |
Published in: |
Information & Computer Security. - Emerald, ISSN 2056-4961, ZDB-ID 2810936-3. - Vol. 28.2019, 1 (28.08.), p. 15-34
|
Publisher: |
Emerald |
Saved in:
Online Resource
Saved in favorites
Similar items by person
-
Countering MitM Attacks Using Evolved PathFinder Algorithm
Chliah, Mouhcine, (2017)
-
Secure Mobile Multi Cloud Architecture for Authentication and Data Storage
Zkik, Karim, (2017)
-
Security model on mobile banking application : attack simulation and countermeasures
Kouraogo, Yacouba, (2017)
- More ...