Abstract
The aim of this article is to analyze SIEM solutions. Emphasizing the use of these systems to ensure data confidentiality, availability, and integrity monitoring energy technology systems. First, the issue of security in the area of energy systems is introduced. In order to maintain the availability, confidentiality and data integrity, the user behavioral analysis modules in SIEM systems are also introduced. The next section presents specific SIEM solutions that can be currently used not only in ICS environments and which will be subject to comparative analysis. This is IBM Security QRadar SIEM and LogRhythm NextGen SIEM. What follows is the introduction and implementation of modules for user behavioral analysis in the mentioned SIEM solutions, including testing own Use Case for testing user behavioral analysis modules. The results of the comparative analysis of user behavioral analysis modules in selected SIEM solutions are presented in the last section.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Keyhani, A.: Design of Smart Power Grid Renewable Energy Systems. John Wiley & Sons, Hoboken (2016)
Zakeri, B., Syri, S.: Electrical energy storage systems: a comparative life cycle cost analysis. Renew. Sustain. Energy Rev. 42, 569–596 (2015). https://doi.org/10.1016/j.rser.2014.10.011.ISSN13640321
Jarmakiewicz, J., Parobczak, K., Maślanka, K.: Cybersecurity protection for power grid control infrastructures. Int. J. Crit. Infrastruct. Prot. 18, 20–33 (2017)
Aitel, D.: Cybersecurity essentials for electric operators. Electricity J. 26(1), 52–58 (2013). https://doi.org/10.1016/j.tej.2012.11.014, ISSN 10406190
Peterson, J., Haney, M., Borrelli R.A.: An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants. Nuclear Eng. Des. 346, 75–84 (2019). https://doi.org/10.1016/j.nucengdes.2019.02.025, ISSN 00295493
LI, L., He W., Li XU, Ash I., Anwar M., Yuan X.: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int. J. Inf. Manag. 45, 13–24 (2019). https://doi.org/10.1016/j.ijinfomgt.2018.10.017, ISSN 02684012
Li, D., Guo, H., Zhou, J., Zhou, L., Wong, J.W.: SCADAWall: a CPI-enabled firewall model for SCADA security. Comput. Secur. 80, 134–154 (2019). https://doi.org/10.1016/j.cose.2018.10.002.ISSN01674048
Rezai, A., Keshavarzi P., Moravej Z.:. Key management issue in SCADA networks: a review. Eng. Sci. Technol. Int. J. 20(1), 354–363 (2017). https://doi.org/10.1016/j.jestch.2016.08.011.
Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436–454 (2017). https://doi.org/10.1016/j.cose.2017.06.010.ISSN01674048
Makkar, A., Kumar, N.: User behavior analysis-based smart energy management for webpage ranking: Learning automata-based solution. Sustain. Comput. Inf. Syst. 20, 174–191 (2018). https://doi.org/10.1016/j.suscom.2018.02.003.ISSN22105379
Yang, L., Wang, Y., Zhou, Y., Wang, J., Fan, Ch., Zhu, Ch.: OA user behavior analysis with the heterogeneous information network model. Phys. A Stat. Mech. Appl. 516, 552–562 (2019). https://doi.org/10.1016/j.physa.2018.09.116.ISSN03784371
Raja, M., Niranjan S., Vasudevan A.R.: Rule generation for TCP SYN flood attack in SIEM Environment. Procedia Comput. Sci. 115, 580–587 (2017). https://doi.org/10.1016/j.procs.2017.09.117, ISSN 18770509
Maher, D.: Can artificial intelligence help in the war on cybercrime? Comput. Fraud Secur. 2017(8), 7–9 (2017). https://doi.org/10.1016/S1361-3723(17)30069-6.ISSN13613723
Nurmuhumatovich, J.A., Mikusova, M.: Testing trajectory of road trains with program complexes. Arch. Autom. Eng. Archiwum Motoryzacji 83(1), 103–112 (2019). https://doi.org/10.14669/AM.VOL83.ART7
Krejcar, O., Frischer, R., Smart intelligent control of current source for high power LED diodes, Microelectron. J. 44(4), 307–314 (2013). ISSN: 0026–2692, eISSN: 1879–2391
Acknowledgment
This work and the contribution were supported by a Specific Research Project, Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic. We would like to thank Mr. J. Nedbal, a graduate of Faculty of management and informatics, University of Hradec Kralove, for the practical verification of the proposed solutions and close cooperation in the solution.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Svoboda, T., Horalek, J., Sobeslav, V. (2021). Behavioral Analysis of SIEM Solutions for Energy Technology Systems. In: Vinh, P.C., Rakib, A. (eds) Context-Aware Systems and Applications, and Nature of Computation and Communication. ICCASA ICTCC 2020 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 343. Springer, Cham. https://doi.org/10.1007/978-3-030-67101-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-67101-3_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67100-6
Online ISBN: 978-3-030-67101-3
eBook Packages: Computer ScienceComputer Science (R0)