Skip to main content

Behavioral Analysis of SIEM Solutions for Energy Technology Systems

  • Conference paper
  • First Online:
Context-Aware Systems and Applications, and Nature of Computation and Communication (ICCASA 2020, ICTCC 2020)

Abstract

The aim of this article is to analyze SIEM solutions. Emphasizing the use of these systems to ensure data confidentiality, availability, and integrity monitoring energy technology systems. First, the issue of security in the area of energy systems is introduced. In order to maintain the availability, confidentiality and data integrity, the user behavioral analysis modules in SIEM systems are also introduced. The next section presents specific SIEM solutions that can be currently used not only in ICS environments and which will be subject to comparative analysis. This is IBM Security QRadar SIEM and LogRhythm NextGen SIEM. What follows is the introduction and implementation of modules for user behavioral analysis in the mentioned SIEM solutions, including testing own Use Case for testing user behavioral analysis modules. The results of the comparative analysis of user behavioral analysis modules in selected SIEM solutions are presented in the last section.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Keyhani, A.: Design of Smart Power Grid Renewable Energy Systems. John Wiley & Sons, Hoboken (2016)

    Google Scholar 

  2. Zakeri, B., Syri, S.: Electrical energy storage systems: a comparative life cycle cost analysis. Renew. Sustain. Energy Rev. 42, 569–596 (2015). https://doi.org/10.1016/j.rser.2014.10.011.ISSN13640321

    Article  Google Scholar 

  3. Jarmakiewicz, J., Parobczak, K., Maślanka, K.: Cybersecurity protection for power grid control infrastructures. Int. J. Crit. Infrastruct. Prot. 18, 20–33 (2017)

    Article  Google Scholar 

  4. Aitel, D.: Cybersecurity essentials for electric operators. Electricity J. 26(1), 52–58 (2013). https://doi.org/10.1016/j.tej.2012.11.014, ISSN 10406190

  5. Peterson, J., Haney, M., Borrelli R.A.: An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants. Nuclear Eng. Des. 346, 75–84 (2019). https://doi.org/10.1016/j.nucengdes.2019.02.025, ISSN 00295493

  6. LI, L., He W., Li XU, Ash I., Anwar M., Yuan X.: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int. J. Inf. Manag. 45, 13–24 (2019). https://doi.org/10.1016/j.ijinfomgt.2018.10.017, ISSN 02684012

  7. Li, D., Guo, H., Zhou, J., Zhou, L., Wong, J.W.: SCADAWall: a CPI-enabled firewall model for SCADA security. Comput. Secur. 80, 134–154 (2019). https://doi.org/10.1016/j.cose.2018.10.002.ISSN01674048

    Article  Google Scholar 

  8. Rezai, A., Keshavarzi P., Moravej Z.:. Key management issue in SCADA networks: a review. Eng. Sci. Technol. Int. J. 20(1), 354–363 (2017). https://doi.org/10.1016/j.jestch.2016.08.011.

  9. Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436–454 (2017). https://doi.org/10.1016/j.cose.2017.06.010.ISSN01674048

    Article  Google Scholar 

  10. Makkar, A., Kumar, N.: User behavior analysis-based smart energy management for webpage ranking: Learning automata-based solution. Sustain. Comput. Inf. Syst. 20, 174–191 (2018). https://doi.org/10.1016/j.suscom.2018.02.003.ISSN22105379

    Article  Google Scholar 

  11. Yang, L., Wang, Y., Zhou, Y., Wang, J., Fan, Ch., Zhu, Ch.: OA user behavior analysis with the heterogeneous information network model. Phys. A Stat. Mech. Appl. 516, 552–562 (2019). https://doi.org/10.1016/j.physa.2018.09.116.ISSN03784371

    Article  Google Scholar 

  12. Raja, M., Niranjan S., Vasudevan A.R.: Rule generation for TCP SYN flood attack in SIEM Environment. Procedia Comput. Sci. 115, 580–587 (2017). https://doi.org/10.1016/j.procs.2017.09.117, ISSN 18770509

  13. Maher, D.: Can artificial intelligence help in the war on cybercrime? Comput. Fraud Secur. 2017(8), 7–9 (2017). https://doi.org/10.1016/S1361-3723(17)30069-6.ISSN13613723

    Article  Google Scholar 

  14. Nurmuhumatovich, J.A., Mikusova, M.: Testing trajectory of road trains with program complexes. Arch. Autom. Eng. Archiwum Motoryzacji 83(1), 103–112 (2019). https://doi.org/10.14669/AM.VOL83.ART7

  15. Krejcar, O., Frischer, R., Smart intelligent control of current source for high power LED diodes, Microelectron. J. 44(4), 307–314 (2013). ISSN: 0026–2692, eISSN: 1879–2391

    Google Scholar 

Download references

Acknowledgment

This work and the contribution were supported by a Specific Research Project, Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic. We would like to thank Mr. J. Nedbal, a graduate of Faculty of management and informatics, University of Hradec Kralove, for the practical verification of the proposed solutions and close cooperation in the solution.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomas Svoboda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Svoboda, T., Horalek, J., Sobeslav, V. (2021). Behavioral Analysis of SIEM Solutions for Energy Technology Systems. In: Vinh, P.C., Rakib, A. (eds) Context-Aware Systems and Applications, and Nature of Computation and Communication. ICCASA ICTCC 2020 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 343. Springer, Cham. https://doi.org/10.1007/978-3-030-67101-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67101-3_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67100-6

  • Online ISBN: 978-3-030-67101-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics