Security Cloud Service
Security Cloud Service
Abstract—Cloud Computing represents one of the most but also to achieve relevant correlation analytics for
significant shifts in information technology and it enables to recognizing cyber threats. To do so, we referenced the
provide cloud-based security service such as Security-as-a- OpenSoC [3] and complemented to our SIEM architecture for
service (SECaaS). Improving of the cloud computing providing the various analysis model and data enrichment. In
technologies, the traditional SIEM paradigm is able to shift to addition, because the main goal of the SIEM is to provide
cloud-based security services. In this paper, we propose the valuable security information provisioning and to perform a
SIEM architecture that can be deployed to the SECaaS platform large-scaled data correlation for detecting cyber threats, we
which we have been developing for analyzing and recognizing apply the Big Data platform which is composed of the
intelligent cyber-threat based on virtualization technologies.
distributed units based on Kafka, Spark, Elasticsearch and
Keywords— SIEM, Security Information and Event
MongoDB [4, 5].
Management, SECaaS, Security-as-a-service, cloud-based security
service. II. DESIGNED SIEM ARCHITECTURE
The designed SIEM architecture mainly consists of the
I.INTRODUCTION SIEM Engine for processing the collected data, the SIEM
The cloud computing represents one of the most Storage for storing the collected data and analysis results, and
significant changes in the field of information security the SIEM user layer for ensuring the security service to the
technology such as cloud-based security-as-a-service. user as shown in the Figure 1.
Although there are many information security technologies for SIEM Engine Data Flow Alert Flow SIEM
Storage
this purpose, the SIEM (Security Information and Event Message Queue Processing Storage
Mongo
and others that are deployed at both the host and network er
Scorer
Elastic
Search /
domains [1,2]. vFW log
Signature Model
Other Model
Profile
Alert
Impala
… Event
We have been developing the SOA (Security-on-Air) Router Signature Mining
Scorer
SQL ON
HADOOP
project which is cloud-based security platform. In cloud data Data-Mining Other Mining
Profile
Alert
others that are deployed at both the host and network domains.
The proposed SIEM can be applied to maintain a huge number Fig. 1. The SIEM Architecture for cloud-based service
of security event log which is generated from virtualized
security systems for ensuring cloud-based security service. The SIEM engine aims to support provision of the
intelligent threat analytics and relevant data output based on
For managing and analyzing the various logs and events its various data processing such as data modeling and data
which are generated by cloud-based security sensors in the mining. The details are explained in the next chapter. For the
SOA project, the SIEM needs to be designed not only to SECaaS service, the SIEM user layer is a specialized
manage log and security events from various security systems,
component which includes the application for accessing the and metadata for data enrichment from the collected
SIEM engine and it enable to support incident response data, and then it is able to provide the correlated data
activities from a wide variety of sources. information to analyze and recognize the status of
In order to support the SIEM service in cloud platform, the cyber threat by the correlated information. The Figure
SIEM user layer is executed on the virtual machine. In detail, 2 represents the work flows of the correlation analysis
upon the user activates the virtual machine which includes the module and the Figure 3 shows the example of
SIEM user layer, and the SIEM Engine retrieves the related correlated data information among the security sensor
information which is retrieved from the SIEM Storage and logs.
instantly becomes running state. For this, it is necessary that Additionally, the long-term’s correlation analytics function
the Data Identifier Manager in SIEM is able to identify each enables to recognize and detect real-time intrusion threats by
event and separate security log per each tenant of cloud-based analyzing the event occurrence patterns related to past
security services. intrusion threats. It enhances the ability of the correlation
analytics between attack cases which were occurred.
III. ANALYTICS IN SIEM ENGINE When the above SIEM engine performs the data analysis
The SIEM engine mainly includes the time-series analytics per each user, it must identify the collected data for each user.
and the correlation analytics in order to provide cloud-based Therefore, this function is carried out by the Data Identifier
SIEM service. Each method is explained as follows. Manager (DIM) that should recognize the data source by
collected data from the various security sensor. This provides
the functionality to run the customized SIEM engine
according to whether the virtual machine of the cloud user is
activated.
ACKNOWLEDGMENT
Fig. 3. Example of Correlated Information This work was supported by Institute for Information &
among vIPS, vFW and vDLP data instance communications Technology Promotion(IITP) grant funded
by the Korea government(MSIP) (No.2017-0-00078, Cloud
∑ Time-Series Data Analytics Function: It is to extract based Security Intelligence Technology Development for the
and calculate statistical data by security source and Customized Security Service Provisioning)
object in collected security event log data. The SIEM
calculates predicted baseline values based on factors
REFERENCES
such as time, a day of the week, protocols and log data
frequency for each service port. By doing so, it can [1] YEN, T., OPREA, A., ONARLIOGLU, K., LEETHAM, T.,
ROBERTSON, W., JUELS, A. AND KIRDA, E. 2013. Beehive:
carry out anomaly detection based on the calculated Large-scale log analysis for detecting suspicious activity in enterprise
event baseline, attack name, traffic information which networks. In Proceedings of the 29th Annual Computer Security
are stored in big data storage. Applications Conference, ACM, 199-208.
∑ Correlation Analytics Function: It provides the data [2] Cloud Security Alliance, https://cloudsecurityalliance. org/group/
security-as-a-service/
information to analysis the correlated features among
[3] OpenSoC Project, http://metron.apache.org
collected security events with the aggregated threat
[4] Apache Kafka Project, https://kafka.apache.org
case dataset. For this, the SIEM generates statistical
[5] Apache Spark™ https://spark.apach.org
database using the big data analytics and data mining
methodologies by IP address, port, signature of event
399