The Ontological Approach for SIEM Data Repository
|
|
|
- Audra Oliver
- 10 years ago
- Views:
Transcription
1 The Ontological Approach for SIEM Data Repository Igor Kotenko, Olga Polubelova, and Igor Saenko Laboratory of Computer Science Problems, Saint-Petersburg Institute for Information and Automation of Russian Academy of Sciences Saint-Petersburg, Russia
2 Content (1) Introduction Related work Existing SIEM systems and standards Choice of the ontological approach Ontological data model Ontological repository implementation Conclusion
3 What is SIEM? Security Information and Event Management (SIEM)= = technology which is intended to provide a coherent collection of security logs from various sources, their long- or short-term storage in a system repository, to use them for security analysis, attack and countermeasure modeling and forecasting and to generate efficient security solutions based on event correlation, data mining, logical reasoning and data visualization.
4 MASSIF Project Activities
5 MASSIF Scenarios " MASSIF results will be demonstrated in: " Four field scenarios: Olympic Games IT infrastructure Mobile phone based money transfer service Managed Enterprise Service Infrastructures Cri>cal infrastructure process control " Existing SIEM solutions:
6 Service Infrastructures for SIEM Systems (1) Case Study 1: Computer network for Olympic Games 20,000 types of security events; 10,000,000 alarms / day; 40,000 elements; 35,000 users.
7 Service Infrastructures for SIEM Systems (2) Case Study 2: Distributed Computer network for Transnational Company Challenges: 1) Massive attacks 2) Low data reliability 3) Inadequate capability of disaster recovery Contribution: 1) Advanced event correlation 2) Management of complex security events
8 Service Infrastructures for SIEM Systems (3) Case Study 3: Mobile Money Transfer Challenges: To counter moneylaundering and other types of fraud Contribution: Event correlation at various levels and between levels
9 Service Infrastructures for SIEM Systems (4) Case Study 4: Critical Infrastructure (Dam) Challenges: 1) distinguish real threats on multiple warnings 2) Law reliability of data sources Contribution: based on the correlation of events, to have a full view of all the potentially critical security events
10 What is Repository Role in SIEM systems? 1. Repository is one of the important components of SIEM systems. 2. Repository is a data warehouse that enables to store security information and event data in an internal format and extracts it at the request of other components for identifying security threats and attacks and generating countermeasures. 3. In SIEM systems it is possible to use the advanced modeling and simulation modules, which also use the data stored in the repository to build the attack and countermeasure graphs.
11 Goals for Repository Development " Develop an approach and techniques for common repository support Develop unified repository, languages and tools for effective management of security information, events and security policies, logical inference about security, flexible visualization Implement software prototypes for storing, manipulating, visualization and validation of security information, events and policies based on the unified repository
12 Is it a critical problem? We examine the issues of data repository development and implementation for new generation SIEM systems. This is a critical problem, because logs are saved to the repository from the multitude of security event sources, the data from the repository are used in a multitude of data processing, modeling and decision making modules of SIEM systems, and it is necessary to provide near real time data processing
13 Main Data Flows with Repository in MASSIF Event filtering, aggregation, abstraction and correlation Reasoning and visualization Data for reasoning and representation Filtered, aggregated and correlated events/alerts Results of reasoning Repository Data for decision making Situation assessment, reaction Predictive alerts, security and countermeasure evaluation Data for modeling and analysis Decision- support, reaction and counter- measures Event- driven Process Models and Attack Modeling MASSIF data Malefactor s models Network (system) configurations and plarforms Security policies Vulnerabilities, scores and weaknesses Attacks and attacks graphs Service dependencies Countermeasures Alerts System models Tasks, reports Correlation strategies Security requirements Enforcement strategies...
14 Repository and Application SIEM Services Application Services Generic Events Dissemination Event Processing Decision Support & Reaction Repository Visualisation Model Management
15 Objectives of the Repository Implementation 1. Design (selection) of a unified repository, languages and tools for effective management of security information, events and policies, and logical inference about security. 2. Implementation of software applications for storing, manipulating, visualizing and validating the security information, events and policies based on the unified repository.
16 Research and Development Goals 1. To examine the main issues of data model design and repository development for new generation SIEM systems. 2. To investigate: Ontological approach for data model development Hybrid approach to implement the repository Advanced repository architecture
17 Content (2) Introduction Related work Existing SIEM systems and standards Choice of the ontological approach Ontological data model Ontological repository implementation Conclusion
18 Basic Directions in SIEM (1) Verification of security policies: [Cruz et al., 2008 ]: an ontology forming the formal basis to model the dynamic aspects of role-based access control (for Olympic Games). [Da Silva et al., 2007]: a security ontology that is used to extract knowledge from natural texts. [Kolovski et al., 2007] and [Rochaeli et al., 2005]: an ontological approach to engineering the security policies, using the ontological services-actors-resources model and the paradigm of ontological templates respectively. [Fitzgerald et al., 2007]: an ontological approach for configuring the firewall management policy for Linux Netfilter.
19 Basic Directions in SIEM (2) Vulnerability analysis: [Rochaeli et al., 2007]: an ontological approach to construct the knowledge representation system for their vulnerabilities modelling. Security monitoring: [Kenaza et al., 2006]: the use of an ontology to provide contextual security event monitoring and intrusion detection (by converting a set of warnings into a set of formatted data). Forensics: [Schatz et al., 2004]: an ontological approach for domainspecific event-based knowledge. In the case of unification with the language rules it is sufficient to apply the standard methods of correlation in the automated forensics.
20 Content (3) Introduction Related work Existing SIEM systems and standards Choice of the ontological approach Ontological data model Ontological repository implementation Conclusion
21 Information and Event Management Standards The Security Content Automation Protocol (SCAP) is the synthesis of interoperable specifications derived from community ideas: Common Platform Enumeration CPE Common Configuration Enumeration CCE Common Vulnerabilities and Exposures CVE Common Vulnerabilities Scoring System CVSS Common Event Expression CEE Other standards: Common Base Event (CBE, IBM) Common Event Format (CEF) The Common Intrusion Specification Language (CISL) The Intrusion Detection Message Exchange Format (IDMEF) The Incident Object Description Exchange Format (IODEF) Common Information model (CIM)
22 Existing SIEM Systems (Gartner, 2012) ArcSight RSA (EMC) Symantec Security Information Manager (SIM) LogLogic IBM Tivoli Security Information and Event Manager (TSIEM) CA Novell LogRhythm netforensics Open Security Platform Tenable LogMatrix All most popular existing SIEM systems use SQL databases!!!
23 Languages for Data Representation RDFS (RDF Schema). RDF data model is a directed graph, which is based on elementary statements (triples). OWL (Web Ontology Language) is a language of Semantic Web, created to represent ontologies. SWRL (Semantic Web Rule Language) is a proposal for a Semantic Web rule language, based on a combination of OWL sublanguages with RuleML sublanguages. SPARQL Protocol and RDF Query Language (SPARQL) is a query language to the data presented on the RDF model as well as the protocol for these requests and responses.
24 Content (4) Introduction Related work Existing SIEM systems and standards Selection of the ontological approach Ontological data model Ontological repository implementation Conclusion
25 Advantages of ontologies Concepts Ontology Strong (strict) weak Logical theory Expressiveness Vocabulary Conceptual model Taxonomy Categorization, simple search and navigation, simple indexing Synonyms, advanced search and navigation, cross indexing Modeling of complex entities, question-andanswer systems (increasing the accuracy) Modeling of real-world domains, semantic search, logical reasoning
26 Representation of the Entity Vulnerability (CVE) Example with AND-OR operations
27 Representation of the entity Vulnerability (SQL) Specification of vulnerabilities in the relational data model is a hard task!!!
28 Architecture of SIEM Inference System Navigation between concepts & resources Ontology Triple store Association search between concepts Resource classification Metadata editor Logical theory Ontological translator Information resources Geterogenous data integration
29 Content (5) Introduction Related work Existing SIEM systems and standards Choice of the ontological approach Ontological data model Ontological repository implementation Conclusion
30 Ontological Data Model for SIEM Repository (vulnerabilities, software/hardware manufacturers and other concepts)
31 Applying in AMSEC
32 Ontological Model of Vulnerability Main features: - the ontology describes vulnerabilities, attacks, software/hardware manufacturers and other concepts - the relationships between software and hardware components are specified using the description logic - connections are represented, mainly, by the subclasses - the logical reference is confined to the task of classification, which increases the processing speed
33 Example of Vulnerability Representation as Triplets CVE standard: <entry id="cve "> <vuln:vulnerable-configuration id=" <cpe-lang:logical-test negate="false" operator="or"> <cpe-lang: fact-ref name="cpe:/a:intersystems:cache_database:5"/> </cpe-lang:logical-test> </vuln:vulnerable-configuration> <vuln:vulnerable-software-list> </entry> Ontological representation in terms of triplets:
34 Content (6) Introduction Related work Existing SIEM systems and standards Choice of the ontological approach Ontological data model Ontological repository implementation Conclusion
35 Advanced Repository Architecture Service layer Store layer SOA architecture data quiries Web-services API Search service CRUD services integrity and consistency checking Security event data Attack model data Prognostic analysis data Decision support data Interconnection with modules by SOAP Hybrid storage
36 Mapping Data Schemas of NIST Standards to Data Model Layer
37 Implementation Features Spring Framework Java Persistence API Data access languages Relational DB " SQL Triplet storage " SPARQL is a query language and a protocol for accessing RDF " SPIN is the RDF syntax for SPARQL XML DB " Xquery " XPath SOAP Web services Spring security 3.0.6
38 Architecture of Virtuoso Virtuoso (OpenLink product) - a complex semantic system repositories, which implements the ability to represent the relational data, XML and triplets. Triplets is a short formal statement in the form of subjectpredicate-object.
39 Main results: Conclusion Ontological approach to provide the necessary flexibility of data representation in the repository and the possibility of more accurate and high-quality results of queering (and ontology for AMSEC) Hybrid approach to implement the repository which allows to integrate relational databases, XML databases and stores of triplets Advanced repository architecture implemented and tested with the data used for attack modeling in SIEM systems Future research: Improving and expanding the proposed ontology Adding to the repository different services that provide data security, verification of security properties and policies, etc. Exploration of logical reasoning based on ontological repository, development of mechanisms for data visualization
40 Questions? Comments? For more information please contact Igor Kotenko Head of Laboratory of Computer Security Problems, St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences (SPIIRAS) This research is being supported by grant of the Russian Foundation of Basic Research (project # a), Program of fundamental research of the Department for Nanotechnologies and Informational Technologies of the Russian Academy of Sciences (contract #2.2), State contract # , Science Support Foundation and partly funded by the EU as part of the SecFutur and MASSIF projects.
41 Contacts Igor Kotenko Olga Polubelova Igor Saenko
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
Future Internet 2013, 5, 355-375; doi:10.3390/fi5030355 Article OPEN ACCESS future internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet Design and Implementation of a Hybrid Ontological-Relational
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009
Automating Attack Analysis Using Audit Data Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009 2 Introduction Audit logs are cumbersome and traditionally used after the fact for forensics analysis.
Towards security management in the cloud utilizing SECaaS
Towards security management in the cloud utilizing SECaaS JAN MÉSZÁROS University of Economics, Prague Department of Information Technologies W. Churchill Sq. 4, 130 67 Prague 3 CZECH REPUBLIC [email protected]
A Cyber Attack Modeling and Impact Assessment Framework
2013 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum (Eds.) 2013 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication for
Securely Yours LLC Top Security Topics for 2013. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC Top Security Topics for 2013 Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps
Semantic Modeling with RDF. DBTech ExtWorkshop on Database Modeling and Semantic Modeling Lili Aunimo
DBTech ExtWorkshop on Database Modeling and Semantic Modeling Lili Aunimo Expected Outcomes You will learn: Basic concepts related to ontologies Semantic model Semantic web Basic features of RDF and RDF
Tivoli Security Information and Event Manager V1.0
Tivoli Security Information and Event Manager V1.0 Summary Security information and event management (SIEM) is a primary concern of the CIOs and CISOs in many enterprises. They need to centralize security-relevant
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Semantic Interoperability
Ivan Herman Semantic Interoperability Olle Olsson Swedish W3C Office Swedish Institute of Computer Science (SICS) Stockholm Apr 27 2011 (2) Background Stockholm Apr 27, 2011 (2) Trends: from
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Core Enterprise Services, SOA, and Semantic Technologies: Supporting Semantic Interoperability
Core Enterprise, SOA, and Semantic Technologies: Supporting Semantic Interoperability in a Network-Enabled Environment 2011 SOA & Semantic Technology Symposium 13-14 July 2011 Sven E. Kuehne [email protected]
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures
Cesario Di Sarno Ph.D. Student in Information Engineering University of Naples «Parthenope» Security Information and Event Management in Critical Infrastructures Fai della Paganella 11 Febbraio 2014 Critical
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
LINKED DATA EXPERIENCE AT MACMILLAN Building discovery services for scientific and scholarly content on top of a semantic data model
LINKED DATA EXPERIENCE AT MACMILLAN Building discovery services for scientific and scholarly content on top of a semantic data model 22 October 2014 Tony Hammond Michele Pasin Background About Macmillan
Big Data and Semantic Web in Manufacturing. Nitesh Khilwani, PhD Chief Engineer, Samsung Research Institute Noida, India
Big Data and Semantic Web in Manufacturing Nitesh Khilwani, PhD Chief Engineer, Samsung Research Institute Noida, India Outline Big data in Manufacturing Big data Analytics Semantic web technologies Case
Business Performance Management Standards
Business Performance Management Standards Stephen A. White, PhD. BPM Architect Business Performance Management Business performance management Taking an holistic approach, companies align strategic and
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
Open Source egovernment Reference Architecture Osera.modeldriven.org. Copyright 2006 Data Access Technologies, Inc. Slide 1
Open Source egovernment Reference Architecture Osera.modeldriven.org Slide 1 Caveat OsEra and the Semantic Core is work in progress, not a ready to use capability Slide 2 OsEra What we will cover OsEra
A generic approach for data integration using RDF, OWL and XML
A generic approach for data integration using RDF, OWL and XML Miguel A. Macias-Garcia, Victor J. Sosa-Sosa, and Ivan Lopez-Arevalo Laboratory of Information Technology (LTI) CINVESTAV-TAMAULIPAS Km 6
Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies
Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08
Publishing Linked Data Requires More than Just Using a Tool
Publishing Linked Data Requires More than Just Using a Tool G. Atemezing 1, F. Gandon 2, G. Kepeklian 3, F. Scharffe 4, R. Troncy 1, B. Vatant 5, S. Villata 2 1 EURECOM, 2 Inria, 3 Atos Origin, 4 LIRMM,
BUSINESS VALUE OF SEMANTIC TECHNOLOGY
BUSINESS VALUE OF SEMANTIC TECHNOLOGY Preliminary Findings Industry Advisory Council Emerging Technology (ET) SIG Information Sharing & Collaboration Committee July 15, 2005 Mills Davis Managing Director
Anatomy of Cyber Threats, Vulnerabilities, and Attacks
Anatomy of Cyber Threats, Vulnerabilities, and Attacks ACTIONABLE THREAT INTELLIGENCE FROM ONTOLOGY-BASED ANALYTICS 1 Anatomy of Cyber Threats, Vulnerabilities, and Attacks Copyright 2015 Recorded Future,
Toward an Ontology Architecture for Cyber-Security Standards
Toward an Ontology Architecture for Cyber-Security Standards Mary C. Parmelee The MITRE Corporation 7515 Colshire Drive, McLean, VA 22102-7539, USA [email protected] Abstract. The rapid growth in magnitude
QRadar SIEM and Zscaler Nanolog Streaming Service
QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
THE SEMANTIC WEB AND IT`S APPLICATIONS
15-16 September 2011, BULGARIA 1 Proceedings of the International Conference on Information Technologies (InfoTech-2011) 15-16 September 2011, Bulgaria THE SEMANTIC WEB AND IT`S APPLICATIONS Dimitar Vuldzhev
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France
CYBEX The Cybersecurity Information Exchange Framework (X.1500)
CYBEX The Framework (X.1500) Anthony Rutkowski Yaana Technologies, USA [email protected] Damir Rajnovic FIRST, USA [email protected] Youki Kadobayashi NAIST, Japan [email protected] Robert Martin MITRE,
Secunia Vulnerability Intelligence Manager (VIM) 4.0
Secunia Vulnerability Intelligence Manager (VIM) 4.0 In depth Real-time vulnerability intelligence brought to you on time, every time, by Secunia s renowned research team Introduction Secunia is the world-leading
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Securing your IT infrastructure with SOC/NOC collaboration
Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Semantic Data Management. Xavier Lopez, Ph.D., Director, Spatial & Semantic Technologies
Semantic Data Management Xavier Lopez, Ph.D., Director, Spatial & Semantic Technologies 1 Enterprise Information Challenge Source: Oracle customer 2 Vision of Semantically Linked Data The Network of Collaborative
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Semantic Stored Procedures Programming Environment and performance analysis
Semantic Stored Procedures Programming Environment and performance analysis Marjan Efremov 1, Vladimir Zdraveski 2, Petar Ristoski 2, Dimitar Trajanov 2 1 Open Mind Solutions Skopje, bul. Kliment Ohridski
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
mframe Software Development Platform KEY FEATURES
mframe Software Development Platform mframe is a comprehensive software development platform for building modern modular WEB and B2B applications. It consists of basic core modules as well as other delevoped
SIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
Long Term Knowledge Retention and Preservation
Long Term Knowledge Retention and Preservation Aziz Bouras University of Lyon, DISP Laboratory France [email protected] Recent years: How should digital 3D data and multimedia information
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Ampersand and the Semantic Web
Ampersand and the Semantic Web The Ampersand Conference 2015 Lloyd Rutledge The Semantic Web Billions and billions of data units Triples (subject-predicate-object) of URI s Your data readily integrated
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Increase Agility and Reduce Costs with a Logical Data Warehouse. February 2014
Increase Agility and Reduce Costs with a Logical Data Warehouse February 2014 Table of Contents Summary... 3 Data Virtualization & the Logical Data Warehouse... 4 What is a Logical Data Warehouse?... 4
A Big Picture for Big Data
Supported by EU FP7 SCIDIP-ES, EU FP7 EarthServer A Big Picture for Big Data FOSS4G-Europe, Bremen, 2014-07-15 Peter Baumann Jacobs University rasdaman GmbH [email protected] Our Stds Involvement
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
Model Driven Interoperability through Semantic Annotations using SoaML and ODM
Model Driven Interoperability through Semantic Annotations using SoaML and ODM JiuCheng Xu*, ZhaoYang Bai*, Arne J.Berre*, Odd Christer Brovig** *SINTEF, Pb. 124 Blindern, NO-0314 Oslo, Norway (e-mail:
What is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
Application of ontologies for the integration of network monitoring platforms
Application of ontologies for the integration of network monitoring platforms Jorge E. López de Vergara, Javier Aracil, Jesús Martínez, Alfredo Salvador, José Alberto Hernández Networking Research Group,
Log Management and SIEM Evaluation Checklist
Log Management and SIEM Evaluation Checklist Authors: Frank Bijkersma ( [email protected] ) Vinod Shankar ([email protected]) Published on www.infosecnirvana.com, www.frankbijkersma.com Date:
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
Supporting Change-Aware Semantic Web Services
Supporting Change-Aware Semantic Web Services Annika Hinze Department of Computer Science, University of Waikato, New Zealand [email protected] Abstract. The Semantic Web is not only evolving into
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing
based on Attack Graphs and Security Event Processing Igor Kotenko 1,2 and Elena Doynikova 1 1 Laboratory of Computer Security Problems St. Petersburg Institute for Informatics and Automation (SPIIRAS)
OWL based XML Data Integration
OWL based XML Data Integration Manjula Shenoy K Manipal University CSE MIT Manipal, India K.C.Shet, PhD. N.I.T.K. CSE, Suratkal Karnataka, India U. Dinesh Acharya, PhD. ManipalUniversity CSE MIT, Manipal,
DJRA1.6 FINAL RELEASE OF NEW GRID MIDDLEWARE SERVICES
3.9. ACTIVE SECURITY INFRASTRUCTURE (ASI) 3.9.1. Overview The aim of the Active Security task is to consider security measures for an interactive framework. To date Grid security activities have largely
Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013
Everything You Always Wanted to Know About Log Management But Were Afraid to Ask August 21, 2013 Logging and Log Management Logging and Log Management The authoritative Guide to Understanding the Concepts
How To Build A Cloud Based Intelligence System
Semantic Technology and Cloud Computing Applied to Tactical Intelligence Domain Steve Hamby Chief Technology Officer Orbis Technologies, Inc. [email protected] 678.346.6386 1 Abstract The tactical
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Increasing IT flexibility with IBM WebSphere ESB software.
ESB solutions White paper Increasing IT flexibility with IBM WebSphere ESB software. By Beth Hutchison, Katie Johnson and Marc-Thomas Schmidt, IBM Software Group December 2005 Page 2 Contents 2 Introduction
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
Reference Ontology for Cybersecurity Operational Information
The Computer Journal Advance Access published October c The British 8, 2014 Computer Society 2014. This is an Open Access article distributed under the terms of the Creative Commons Attribution License
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Linked Data Interface, Semantics and a T-Box Triple Store for Microsoft SharePoint
Linked Data Interface, Semantics and a T-Box Triple Store for Microsoft SharePoint Christian Fillies 1 and Frauke Weichhardt 1 1 Semtation GmbH, Geschw.-Scholl-Str. 38, 14771 Potsdam, Germany {cfillies,
A Collaborative System Software Solution for Modeling Business Flows Based on Automated Semantic Web Service Composition
32 A Collaborative System Software Solution for Modeling Business Flows Based on Automated Semantic Web Service Composition Ion SMEUREANU, Andreea DIOŞTEANU Economic Informatics Department, Academy of
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya
Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data
FUNCTIONAL OVERVIEW www.amdosoft.com
Business Process Protectors Business Service Management Active Error Identification Event Driven Automation Error Handling and Escalation Intelligent Notification Process Reporting IT Management Business
Open Unified Data Protection and Business Continuity Framework
Open Unified Data Protection and Business Continuity Framework Presenter: Dr. Anupam Bhide Calsoft, Inc. Email: [email protected] Phone: +91 (20) 4079 2900 Authors: Anupam Bhide (Calsoft) Parag Kulkarni
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Attack Modeling and Security Evaluation in SIEM Systems
International Transactions on Systems Science and Applications Volume 8 December 2012 pp. 129-147 sai: itssa.0008.2012.041 ISSN 1751-1461 (print) ISSN 2051-5642 (online) Attack Modeling and Security Evaluation
Attack Taxonomies and Ontologies
Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik Technische Universität München Attack Taxonomies and Ontologies Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Graph Database Performance: An Oracle Perspective
Graph Database Performance: An Oracle Perspective Xavier Lopez, Ph.D. Senior Director, Product Management 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Program Agenda Broad Perspective
Magic Quadrant for Security Information and Event Management
Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00212454, Mark Nicolett, Kelly M. Kavanagh, 12 May 2011, RV4A105172012 Broad adoption of SIEM technology is
