VaultBox: Enhancing the Security and Effectiveness of Security Analytics

被引:0
|
作者
Trivedi, Devharsh [1 ]
Triandopoulos, Nikos [1 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
来源
关键词
Security analytics; Rateless encoding; Secure logging; SIEM security; LT codes; Secure coding;
D O I
10.1007/978-3-031-45933-7_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security tools like Firewalls, IDS, IPS, SIEM, EDR, and NDR effectively detect and block threats. However, these tools depend on the system, application, and event logs. Logs are the key ingredient for various purposes, including troubleshooting performance issues, satisfying compliance mandates, and monitoring and improving security. In addition, logs from multiple machines are collected and fed to the Security Information and Event Management (SIEM) system for further security analysis. Therefore, a SIEM system's efficiency and effectiveness depend heavily on the quality and quantity of logs provided. Unfortunately, logs are often targeted brutally and tampered with after a successful intrusion to cover the attack's traces. Thus it becomes critical to protect the confidentiality, integrity, availability, and authenticity of logs at rest or transit. This paper proposes a novel scheme to prevent logs from tampering, detect any tampering, and recuperate logs if lost or corrupt. Our scheme is forward-secure, replicated, randomized, and rate-less, aiming to help securely store and transmit logs to SIEM.
引用
收藏
页码:401 / 422
页数:22
相关论文
共 50 条
  • [21] Visual Analytics for cyber security and intelligence
    Lavigne, Valerie
    Gouin, Denis
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2014, 11 (02): : 175 - 199
  • [22] Preemptive Security Through Information Analytics
    Early, Gregory
    Stott, William, III
    INFORMATION SECURITY JOURNAL, 2015, 24 (1-3): : 48 - 56
  • [23] Big Data Analytics for Information Security
    Szczypiorski, Krzysztof
    Wang, Liqiang
    Luo, Xiangyang
    Ye, Dengpan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [24] Security Analytics in the Big Data Era
    Mondek, Dusan
    Blazek, Rudolf B.
    Zahradnicky, Tomas
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 605 - 606
  • [25] Idea: Visual Analytics for Web Security
    Le Pochat, Victor
    Van Goethem, Tom
    Joosen, Wouter
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 124 - 132
  • [26] Bridging Knowledge Gaps in Security Analytics
    Boehm, Fabian
    Vielberth, Manfred
    Pernul, Guenther
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 98 - 108
  • [27] Exploratory security analytics for anomaly detection
    Pierazzi, Fabio
    Casolari, Sara
    Colajanni, Michele
    Marchetti, Mirco
    COMPUTERS & SECURITY, 2016, 56 : 28 - 49
  • [28] The Effectiveness of Security Measures
    Christin, Nicolas
    COMMUNICATIONS OF THE ACM, 2022, 65 (09) : 92 - 92
  • [29] Enhancing Collaboration Between Security Analysts in Security Operations Centers
    Cremilleux, Damien
    Bidan, Christophe
    Majorczyk, Fredeic
    Prigent, Nicolas
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, 2019, 11391 : 136 - 142
  • [30] Enhancing effectiveness of agriculture group in supporting government program to increase food security
    Retnowati, Daru
    Subarjo, A. H.
    1ST INTERNATIONAL CONFERENCE ON SCIENCE, MATHEMATICS, ENVIRONMENT AND EDUCATION, 2018, 1022