论文标题
适应性的插件安全操作中心利用新型可编程插件的入侵检测和预防系统
Adaptable Plug and Play Security Operations Center Leveraging a Novel Programmable Plugin-based Intrusion Detection and Prevention System
论文作者
论文摘要
在过去的十年中,网络攻击的数量已大大增加,从而造成了巨大的组织财务损失。确实,这不再是“如果”的问题,而是“何时”安全事件发生。安全操作中心(SOC)的采用将有助于对问题的检测,识别,预防和解决问题,然后才能造成广泛的网络相关损害。在本文中,我们提出的框架是为了解决当前开源SOC实施困扰的问题。这些包括缺乏即时增强的能力,缓慢的开发过程以及它们对持续及时更新的无能。我们在此提出了一个框架,该框架将提供完全自动化的开源SOC部署;否则称为“插入式框架”;完整的水平可伸缩性结合了模块化体系结构。这些基础功能旨在减轻潜在的SOC挑战,这些挑战通常是由于许多预定和重复的过程而出现的,从而加强了它们使用新工具扩展的能力。这是增强其作为单个逻辑单元中群集中更多服务器处理更多服务器的能力。我们还引入了一种新的系统,称为基于可编程插件的入侵检测和预防系统(PPIDPS)。该系统将扩展SOC的能力,在收集可疑行为时收集可能触发警报的日志时,将任何工具添加到受监视的设备中。
The number of cyber-attacks have substantially increased over the past decade resulting in huge organizational financial losses. Indeed, it is no longer a matter of "if" but "when" a security incident will take place. A Security Operations Center(SOC) adoption will help in the detection, identification, prevention, and resolution of issues before they end up causing extensive cyber-related damage. In this paper, our proposed framework is brought about to address the problem that current open-source SOC implementations are plagued with. These include lack of ability to be strengthened on the fly, slow development processes, and their ineptness for continuous timely updates. We, herein, propose a framework that would offer a fully automated open-source SOC deployment; otherwise dubbed, a "plug-and-play framework"; full horizontal scalability incorporating a modular architecture. These underpinning features are meant to mitigate underlying SOC challenges, which often emerge as a result of many pre-determined and repeated processes, bolstering their ability for expansion with new tools. This is on top of enhancing their ability to handle more servers in the clusters as a single logical unit. We also introduce a new system of its kind called a Programmable Plugin-based Intrusion Detection and Prevention System (PPIDPS). This system will extend a SOC's ability to add any tool to the monitored devices while collecting logs that can trigger alerts whenever a suspicious behavior is detected.