Analysis of SIEM Systems and Their Usage
Analysis of SIEM Systems and Their Usage
Abstract
To achieve business objectives, to stay competitive and to operate legally modern organizations of all
types (e.g. commercial enterprises, government agencies, not-for profit organizations), different size
and sphere of activity need to match a lot of internal and external requirements. They are called
compliance regulations and mean conforming to a rule, such as a specification, procedure, policy,
standard, law, etc. These organizations need to ensure valuable assets, uninterrupted business
operation (processes), reliable data and differentiated quality of service (QoS) to various groups of
users. They need to protect their clients and employees not only inside but also outside organization
itself in connection with which two new terms were introduced teleworking or telecommuting.
According to Gartner by 2020, 30 % of global enterprises will have been directly compromised by an
independent group of cybercriminals or cyberactivists. And in 60 % of network breaches, hackers
compromise the network within minutes, says Verizon in the 2015 Data Breach Investigations Report.
An integrated system to manage organizations intranet security is required as never before. The data
collected and analyzed within this system should be evaluated online from a viewpoint of any
information security (IS) incident to find its source, consider its type, weight its consequences,
visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation
solutions with weighted impact relevance. The brief analysis of a concept and evolution of Security
Information and Event Management (SIEM) systems and their usage in Security Operations Centers
and Security Intelligence Centers for intranets IS management are presented.
Keywords: SIEM, Security Operations Center, Security Intelligence Center, information security, information
security incidents
1 Introduction
IS incident refers to a single or a series of unwanted or unexpected IS events that have a significant
probability of compromising business operations and threatening (ISO27000, 2016). In turn IS event is
an identified (observed) occurrence of a system, service or network state indicating a negative
consequence such as a possible breach of IS, policy, standard security practice or failure of controls, or
a previously unknown situation that may be security relevant. IS events may be considered as a part of
one IS incident, while the IS incident as a set of IS events. Any attack on a system, service or network
can be classified as an IS event or incident. It is vital to know which IS threats exist at the moment,
how they could grow into an IS incident and then affect an organization, especially if they could result
in exposure of intellectual property and confidential data or service interruption, jeopardize its
reputation or financial well-being, etc. So a specialized Security Operations Center (SOC) with the
right information protection tools (IPTs) and skilled staff in place as a heart of a good IS incident
management has been appeared in the late 1990s. After that a Security Intelligence Center (SIC) with
an integrated IS architecture providing full visibility and control and context-driven security
intelligence in one place to temporarily deal with network-level and more important higher-level IS
events has appeared in 2010. In majority of cases SOCs and SICs are based on Security Information
and Event Management (SIEM) systems as their integral part.
Our goal is to compare SIEM 1.0 and SIEM 2.0 and their usage in SOCs and SICs. As a
preparatory stage for creating our own Network Security Intelligence Center in the future, we
systematize their main features and follow their evolutionary design logic. For that purpose the
remainder of the paper is organized as follows. SIEM concept is introduced in Section 2. SEIM 1.0-
based SOCs and SIEM 2.0-based SICs are briefly analyzed in Sections 3 and 4 respectively. The
future research area concludes the paper.
2 SIEM concept
IPTs can register millions of IS events of different origins and consequences in the intranets of
large organization during one day only. The amount of work required to identify the truly important
data from the viewpoint of IS events and to obtain information on IS incidents can be extremely large.
Unfortunately, this activity, often manual and time-consuming, can overwhelm the most experienced
professionals.
The automated systems (software) for IS event management SIEM systems are used to solve
the problem of flow control of the IS events coming from IPTs and to computerize IS incident
management process. These systems are crucial for organizations IS. All sizes organizations typically
need a SIEM system for compliance purposes to automatically generate reports that provide evidence
of the organization's adherence to various compliance requirements. To completely and correctly
perform assigned tasks SIEM systems require frequent tuning and customization as they serve in
constantly changing, dynamic environment. The indicators (in the form of corresponding patterns) of
intranets resources compromise are deployed as alerts in SIEM systems.
The term SIEM itself has been introduced by the research and consulting company Gartner in
2005. SIEM evolutionary replaced the two types of systems that have historically emerged before
them Security Information Management (SIM) and Security Event Management (SEM) systems
(IBM, 2010).
SIM systems provided long-term storage in a centralized repository, trend analysis and automated
reporting based on their log lists.
SEM systems collect events in real time, conduct their near real-time analysis, send notifications
and represents information at an operators console to take defensive actions more quickly. Thus,
SEM is oriented to immediacy, while SIM is more oriented to historic record keeping.
A combined SIEM system collects logs and other IS-related information for analysis.
The key functions of these three systems can be summed up as follows:
SIM log collection, archiving, historical reporting and forensics;
SEM real-time reporting, log collection, normalization, correlation and aggregation;
SIEM log collection, normalization, correlation, aggregation and reporting.
Log collection of event records from various intranets sources provides computer forensics tools
and helps to address compliance reporting requirements. Normalization maps log messages from
numerous systems into a common data model, enabling the organization to connect and analyze
related events despite of their initially different log source formats. Correlation links logs and events
from disparate systems or applications, speeding detection of and response to IS threats. Aggregation
reduces the volume of event data by consolidating duplicate event records. Reporting presents the
correlated, aggregated event data in real-time monitoring and long-term summaries.
Typical SIEM system architecture is depicted in Figure 1 (IBM, 2010). The bottom of the figure
shows the basic event collection and record retention capabilities. This retained data in the middle is
then used for monitoring and correlation tasks. The top shows that the analyzed data can be reported in
either security information or event driven reports.
Two basic approaches are used in SIEM systems (Techtarget, 2014) (Scarfone, 2015):
1. Agentless, when the log-generating host directly transmits its logs to the SIEM or an
intermediate logging server involved, such as a syslog server;
2. Agent-based with a software agent installed on each host that generates logs being
responsible for extracting, processing and transmitting the data to the SIEM server.
Most SIEM systems work by deploying multiple collection agents in a hierarchical manner to
gather IS-related events from IPTs, network equipment, end-user devices, servers, etc. The collectors
forward events to a centralized management console, which performs inspections and flags anomalies.
SIEM systems can be rule-based (obvious disadvantages of this approach are time consuming of
keeping up-to-date hundreds of rules, too many false positives and false negatives for constantly
innovative attackers techniques), policy-based or have a statistical correlation engine to establish
relationships between event log entries (IBM, 2010) (Miller, 2010).
All data processed by SIEM system should be protected itself as it contains very sensitive
information needed for digital forensics and IS incident response.
5 Conclusion
At present even SICs idea does not keep pace with the increasing number of sophisticated IS
threats in highly heterogeneous connected world. The next evolutionary step towards creation of more
effective IS management structure for securing organizations IT assets is expected as never before. In
our opinion, this progressive structure should unite all benefits of SIC with many years experience of
network operations management, implemented in NOCs Network Operations Centers. Our future
work is aimed at their design.
6 Acknowledgement
This work was supported by the MEPhI Academic Excellence Project (agreement with the
Ministry of Education and Science of the Russian Federation of August 27, 2013, project
no. 02.a03.21.0005).
References
ISO/IEC 27000:2016 Information technology -- Security techniques -- Information security
management systems -- Overview and vocabulary.
IBM Corporation (2010). IT Security Compliance Management Design Guide with IBM Tivoli
Security Information and Event Manager. 2nd edition. URL: http://www.redbooks.ibm.com/
abstracts/sg247530.html?Open (access date 05/03/2017).
Techtarget (2014). Security information and event management (SIEM). URL:
http://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM
(access date 05/03/2017).
Scarfone, K. (2015). Introduction to SIEM services and products. URL: http://searchsecurity.
techtarget.com/feature/Introduction-to-SIEM-services-and-products (access date 05/03/2017).
Miller, D., Harris, S., Harper, A., VanDyke, S. (2010). Security Information and Event
Management (SIEM) Implementation. McGraw-Hill. 2010. 464 p.
Miloslavskaya, N.G., Senatorov, M.Y., Tolstoy, A.I. (2014). Information Security Management
Issues Series. In 5 volumes. Volume 3: Information Security Incident and Business Continuity
Management. Moscow: Goriachaja linia-Telecom. 2014. 2nd edition. 170 p. (In Russian)
Verizon (2015). Data Breach Investigations Report. URL: http://www.verizonenterprise.com/
DBIR/2015/ (access date 05/03/2017).