<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rat Berdibayev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy Fesenko</string-name>
          <email>aafesenko88@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Kyryliuk</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatoly Bessalov</string-name>
          <email>a.bessalov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Almaty University of Power Engineering and Telecommunication</institution>
          ,
          <addr-line>126/1 Baytursynuli str., Almaty, 050013</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudravska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Volodymyr Vynnychenko Central Ukrainian State Pedagogical University</institution>
          ,
          <addr-line>1 Shevchenka str., Kropyvnytskyi, 25000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>149</fpage>
      <lpage>166</lpage>
      <abstract>
        <p>Today Security Information and Event Management (SIEM) systems are used to prevent information loss in computer systems and networks. There are many approaches to SIEM realization. This paper is devoted to the analysis of existing SIEM and their characteristics in accordance with international standards and specifications, as well as a comparative description of their capabilities and differences, advantages and disadvantages. These results will be used in research project realization devoted to open source SIEM development and implementation in critical infrastructure to improve the cybersecurity level in the context of information warfare and cyber threats realization.</p>
      </abstract>
      <kwd-group>
        <kwd>1 SIEM</kwd>
        <kwd>firewall</kwd>
        <kwd>IDS</kwd>
        <kwd>cyber attack</kwd>
        <kwd>cyber monitoring</kwd>
        <kwd>security management</kwd>
        <kwd>risk management</kwd>
        <kwd>information warfare</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Main Characteristics of SIEM</title>
      <p>To solve problems related to security and fixing events of a SIEM system, consider the main
functionality of SIEM systems:
 Data aggregation: data log management; data is collected from various sources.
 Correlation: finding common attributes, linking events to meaningful clusters.
 Alert: automated analysis of correlated events and generation of notifications (alarms) about
current problems (e-mail, GSM-gateway, applications on the phone).
 Display facilities: displays graphs to help identify work anomalies using prepared patterns.
 Compatibility: using add-ons to automate data collection, create reports to adapt aggregated
data to existing information security management and audit processes.
 Data storage: the use of long-term data storage in historical order to correlate data over time
and for further computer forensics and investigation of network incidents.
 Expert analysis: the ability to search through a variety of journals on various nodes, including
for software and technical expertise.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Analysis of Modern SIEM Systems</title>
      <p>Based on these characteristics, we have analyzed up-to-date SIEM systems and compare their
capabilities. It was the main objective of this research study.</p>
    </sec>
    <sec id="sec-4">
      <title>3.1. IBM QRadar Security Intelligence Platform</title>
      <p>
        IBM QRadar Security Intelligence Platform [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] consists of a number of integrated systems for event
collection, monitoring, security analysis and incident investigation:
1. Log Manager.
2. SIEM.
3. Flow Processor.
4. Vulnerability Manager.
5. Risk Manager.
6. Network Insights.
7. Watson Advisor for Cyber Security.
8. Packet Capture and Incidents Forensics.
      </p>
      <p>QRadar allows you to collect and process information about information security events from
security audit logs, analyze network statistics (NetFlow, etc.), independently analyze network traffic
and transmitted information, build a network topology and emulate changes in configuration files of
network equipment, identify vulnerabilities and unsafe settings systems, completely capture traffic and
recreate a chain of communications between network nodes.</p>
      <p>Benefits of the IBM QRadar Security Intelligence Platform (Fig. 1):
 A unified platform for the systematic creation of SOC: collection and analysis of information
security events, detection of abnormal network activity, scanning of vulnerabilities and
identification of unsafe configurations, integration with artificial intelligence IBM Watson,
network forensics and transition to incident response processes in IBM Resilient.
 Flexible architecture of QRadar Platform, which allows you to redefine the role and functions
of platform modules and does not limit client companies to rigid frameworks of a once-selected
scheme.
 A large number of free applications, content and integration modules.</p>
    </sec>
    <sec id="sec-5">
      <title>3.2. logRhythm</title>
      <p>
        LogRhythm [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], as a platform, offers an intelligent security solution that uses artificial intelligence
to analyze logs and traffic on Windows and Linux systems (Fig. 2).
      </p>
      <p>System advantages:
 has an expandable data storage;
 suitable for systems where there is no structured data, no centralized visibility or automation;
 suitable for small and medium-sized organizations;
 allows you to filter out useless information or other logs and narrow the analysis down to the
network level;
 Compatible with a wide range of logs and devices, and seamlessly integrates with Varonis to
enhance threat and incident response capabilities.</p>
    </sec>
    <sec id="sec-6">
      <title>3.3. HPE ArcSight</title>
      <p>
        Hewlett Packard Enterprise (HPE) ArcSight is the most widespread SIEM system in the
EastEuropean market [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>HPE ArcSight is targeted at midsize to large enterprises and service providers (Fig. 3).</p>
      <p>The HPE ArcSight platform can be deployed as a device, software, or virtual instance. HPE ArcSight
supports a scalable n-tier architecture with HPE ArcSight Management Center.</p>
      <p>HPE ArcSight benefits:
 Arcsight ESM provides a complete set of SIEM capabilities that can be used to support a
large-scale SOC, including a complete incident investigation and management workflow, and
a dedicated deployment management console.
 HPE User Behavior Analytics identifies anomalies based on user behavior analysis and
complements traditional correlation, which is the core function of arcsight.
 DNS Malware Analytics analyzes DNS traffic and provides complete visibility of the IT
infrastructure, which helps to identify network vulnerabilities even before attackers take
advantage of them.
 Arcsight Threat Central contains an online threat knowledge base and allows you to share
information on how to detect and eliminate them.</p>
    </sec>
    <sec id="sec-7">
      <title>3.4. Splunk</title>
      <p>Splunk is a tool that leverages the power of artificial intelligence and machine learning to deliver
actionable, effective, and predictive insights (Fig. 4).</p>
      <p>
        Splunk [
        <xref ref-type="bibr" rid="ref5 ref7">5,7</xref>
        ] is suitable for all types of organizations for both on-premises and SaaS deployments.
Key benefits:
 Fast threat detection.
 Identification and assessment of risks.
 Management of alerts.
 Ordering events.
 Fast and efficient response.
 Works with data from any machine, both on-premises and in the cloud infrastructure.
      </p>
    </sec>
    <sec id="sec-8">
      <title>3.5. McAfee Enterprise Security Manager</title>
      <p>
        McAfee Enterprise Security Manager (ESM) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is delivered as physical and virtual devices and
software. The three main components that make up SIEM are ESM, Event Receiver and Enterprise Log
Manager, which can be deployed together as a single instance or separately for distributed or
largescale environments (Figure 5).
      </p>
      <p>McAfee Enterprise Security Manager benefits:
 Enterprise Security Manager has good coverage of Industrial Control Systems (ICS) and</p>
      <p>Supervisory Control and Data Acquisition (SCADA) devices.
 McAfee Data Exchange Layer (DXL) from Intel Security provides non-API integration with
third-party technologies. This approach makes it possible to use ESM as a SIEM platform.
 McAfee Global Threat Intelligence extends Enterprise Security Manager's SIEM system by
adding a source of continuously updated threat intelligence, enabling rapid detection of events
involving communications with suspicious or malicious IP addresses.</p>
    </sec>
    <sec id="sec-9">
      <title>3.6. Alien Vault USM</title>
      <p>Alient Vault USM is a comprehensive information security management platform that centralizes
and simplifies threat detection, incident response, and compliance management in cloud and
onpremises environments (Fig. 6).</p>
    </sec>
    <sec id="sec-10">
      <title>3.7. FortiSIEM</title>
      <p>
        FortiSIEM is a comprehensive, scalable security, performance, and compliance management tool
for all infrastructure components, capable of working with both the cloud and the Internet of Things
(IoT) [
        <xref ref-type="bibr" rid="ref15">15–18</xref>
        ]. The FortiSIEM solution [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is aimed at reducing the complexity of detecting threats
while increasing the effectiveness of the security system and exchanging information with the product,
including about discovered vulnerabilities (Fig. 7.).
Key features of FortiSIEM (Fig. 8):
 Scalable and flexible log collection.
 Incident notification and management.
 Providing the user with fully functional custom dashboards.
 Integration of external threat data.
 Providing a scalable analysis function.
 Set baselines and identify statistical anomalies in endpoint /server/user behavior.
 Integration of external technologies.
      </p>
    </sec>
    <sec id="sec-11">
      <title>3.8. Ixia ThreatARMOR</title>
      <p>Key features (Fig. 9):
 Ensuring full bandwidth.
 Eliminate threats by blocking all traffic from known malicious sites and untrusted countries.
 Elimination of the possibility of false positives - visual confirmation of malicious actions for all
blocked sites.
 Improved processing efficiency by reducing the number of safety alerts.
 Threat Intelligence updates every 5 minutes using Cloud Update Subscription (ATI).
 Quick identification of compromised internal systems.
 Blocking the connection with the captured ip-addresses.
 Dual power redundancy and built-in bypass capability for maximum reliability.
 Easy 30-minute setup with no further adjustments or maintenance, and centralized management
from the cloud.</p>
      <p>
         Increases the return on investment and performance of the network security infrastructure [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
    </sec>
    <sec id="sec-12">
      <title>3.9. MozDef (Mozilla Defense Platform)</title>
      <p>
        The Mozilla SIEM system MozDef [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is used to automate security incident handling. The system
is designed from scratch for maximum performance, scalability and fault tolerance, with a microservice
architecture - each service runs in a Docker container (Fig. 10).
      </p>
      <p>Benefits:
 Does not use agents - works with standard JSON logs.
 Easily scalable due to microservice architecture.</p>
      <p> Supports cloud service data sources including AWS CLOUDTRAIL and GUARDDUTY.
3.10. Wazuh</p>
      <p>
        System advantages (Fig. 11):
 Based and compatible with the popular SIEM OSSEC.
 Supports various installation options: DOCKER, PUPPET, CHEF, ANSIBLE.
 Supports monitoring of cloud services including AWS and AZURE.
 Includes a comprehensive set of rules to detect many types of attacks and allows them to be
compared in accordance with PCI DSS V3.1 and CIS.
 Integrates with the SPLUNK log storage and analysis system, event visualization and API
support [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
    </sec>
    <sec id="sec-13">
      <title>3.11. Prelude OSS</title>
      <p>
        Prelude OSS (Fig. 12) solution is a flexible modular SIEM system that supports many log formats,
integration with third-party tools such as OSSEC, Snort and Suricata network detection system.
Advantages [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ]:
 A time-tested system in development since 1998.
 Supports many different log formats.
      </p>
      <p> Normalizes data to IMDEF format, making it easy to transfer data to other security systems.
3.12. Sagan</p>
      <sec id="sec-13-1">
        <title>System advantages (Fig. 13):</title>
        <p>
           Fully compatible with SNORT database, rules, and user interface.
 Multi-threaded architecture provides high performance [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>3.13. Maxpatrol</title>
      <p>The advantages of this system (Fig. 14):
 Modularity of the product providing high scalability and performance.
 Deep integration of the SIEM system with the MAXPATROL security analysis tool.
 Correlation rules are resistant to changes in its infrastructure.
 Vendor’s willingness to connect any source of logs.
 An event normalization system that allows you to search for events using various structured data.
 Customer customization support—the ability to create your own event filters, correlation rules,
collection profiles.
 The ability to distribute incidents among employees, track the status of investigations and
conduct work processes within the SIEM system.</p>
    </sec>
    <sec id="sec-15">
      <title>3.14. SOLARWINDS</title>
      <p>
        SolarWinds (Fig. 15) has great capabilities for managing logs and reporting, responding to incidents
in real time [
        <xref ref-type="bibr" rid="ref10 ref5">5,10</xref>
        ].
      </p>
      <p>Main features of the system:
 Fast detection of suspicious actions and threats.
 Continuous monitoring of the security status.
 Determining the time of the event.
 Compliance with DSS, HIPAA, SOX, PCI, STIG, DISA and other regulations.
 Solarwinds’ solution is suitable for small and large businesses. It has both on-premises and cloud
Deployment options and runs on Windows and Linux.</p>
    </sec>
    <sec id="sec-16">
      <title>3.15. ANAGEENGINE</title>
      <p>EventLog Analyzer ManateEngine is a SIEM solution that focuses on analyzing various logs and
extracting various performance and security information from them (Fig. 16).</p>
      <p>Target areas include key sites and applications such as web servers, DHCP servers, databases, print
servers, mail services, etc.</p>
      <p>
        In addition, the ManageEngine analyzer, which runs on Windows and Linux systems, is useful for
bringing systems into compliance with data protection standards such as PCI, HIPPA, DSS, ISO 27001,
etc. [
        <xref ref-type="bibr" rid="ref11 ref9">9,11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-17">
      <title>3.16. EventTracker</title>
      <p>
        Key features of the SIEM EventTracker platform (Fig. 17):
1. Real-time alert and incident response. EventTracker generates rule-based alerts with dashboard
updates and fix recommendations.
2. Search and forensic analysis. Logs are indexed in Elastic Search using an extensible shared
indexing model.
3. Making report. The reporting module includes over 1,500 predefined security and compliance
reports. Full support is included for PCI-DSS, HIPAA, ISO 27001, NIST 800-171, DoD, RMF,
GDPR and more.
4. Behavior analysis and correlation. EventTracker quickly detects and tracks changes in systems
and user behavior. Real-time processing and correlation gives a complete picture of what's new
and different.
5. Threat analysis. EventTracker integrates with valuable threat data streams from ecosystem
partners and open source vendors to provide fast and accurate threat detection to your network
[
        <xref ref-type="bibr" rid="ref12 ref5">5,12</xref>
        ].
      </p>
    </sec>
    <sec id="sec-18">
      <title>3.17. Micro Focus ArcSight</title>
      <p>Micro Focus ArcSight is a cybersecurity product that provides big data security analytics and
intelligence software for information security and event management (SIEM) and account management.</p>
      <p>
        Real-time threat detection and response supported by efficient, intelligent open source SIEM
(security information and event management) software. Micro Focus ArcSight is a cybersecurity
product that provides big data security analytics and intelligence software for information security and
event management (SIEM) and account management [
        <xref ref-type="bibr" rid="ref13 ref6">6,13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-19">
      <title>3.18. Trustwave SIEM Enterprise</title>
      <sec id="sec-19-1">
        <title>Trustwave benefits:</title>
        <p>
           Users of other Trustwave security products will benefit from improved bi-directional integration
with technologies in their portfolio that support automatic response capabilities, such as isolating
compromised endpoints or blocking user accounts;
 Trustwave SIEM Enterprise (Fig. 18) has one of the simplest architectures, which reduces the
load on clients during deployment and subsequent expansion [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-20">
      <title>3.19. BlackStratus SIEM Storm</title>
      <p>
        The BlackStratus SIEMStorm device provides flexible threat visualization and mitigation tools
across distributed networks. SIEMStorm integrates with existing network and security equipment,
providing the following advanced features [
        <xref ref-type="bibr" rid="ref10 ref14">10,14</xref>
        ]:
1. Extended architecture. Blackstratus Siemstorm provides full failover and tiered redundancy to
meet complex regulatory requirements, business continuity and risk management.
2. Real-time visualization of the attack. Identify zero-day attacks using complex metrics based on
rules, vulnerabilities, statistical and historical correlations.
3. Correlation of vulnerability. Integrate data from CVE-compliant intrusion detection systems,
eliminate false positives and free your team to focus on real threats
4. Transparency. Gain unprecedented visibility across distributed networks to correlate activity in
separate network environments, identify hidden threats, suspicious trends, and other potentially
harmful behavior
5. Making report. Blackstratus Siemstorm provides easy reporting for iso, pci, hipaa, sox and other
compliance standards
      </p>
    </sec>
    <sec id="sec-21">
      <title>3.20. RSA NetWitness Suite (EMC)</title>
      <p>RSA NetWitness Suite provides threat visibility using data from security events and other log
sources, full packet capture, NetFlow, and endpoints (via RSA NetWitness Endpoint).</p>
      <p>
        RSA NetWitness is focused on real-time monitoring, analysis, and alerting in addition to proactive
threat support and incident response and forensic investigation [
        <xref ref-type="bibr" rid="ref14 ref5">5,14</xref>
        ].
      </p>
      <p>Benefits of RSA NetWitness Suite:</p>
      <p>The rsa netwitness platform brings together threat detection and event monitoring analytics,
investigation and analysis of threats in network traffic, endpoints and other sources of security
events and logs.</p>
      <p>Modular deployment options allow customers to choose to monitor network traffic and monitor
and analyze events and logs as needed.</p>
      <p>RSA LIVE provides a simple and automated approach to ensure uninterrupted delivery of threat
intelligence, content and other updates.</p>
    </sec>
    <sec id="sec-22">
      <title>4. Comparative Analysis of SIEM Systems</title>
    </sec>
    <sec id="sec-23">
      <title>5. Conclusion</title>
      <p>In this paper, we reviewed existing modern SIEM systems, their functionality, the basic principle of
their operation, and also conducted a comparative analysis of each of them, their capabilities and
differences, advantages and disadvantages of use. An analysis was also carried out for compliance with
international specifications and standardizations in this sphere.</p>
      <p>Based on the analysis, we can declare that the FortiSIEM system is the most optimal. Systems IBM
QRadar, LOGRHYTHM, according to the selection criteria, also gain a large number of points, but are
expensive and not available for many companies. Also, developers should pay their attention on the
open source solutions specified in Table 1 and 2.</p>
      <p>In the future these results will be used in research project realization devoted to open source SIEM
development and implementation in critical infrastructure to improve the cybersecurity level in the
context of information warfare and cyber threats realization.
linux
linux/windows</p>
      <p>linux</p>
      <sec id="sec-23-1">
        <title>Unix/Windows</title>
      </sec>
      <sec id="sec-23-2">
        <title>Windows</title>
      </sec>
      <sec id="sec-23-3">
        <title>Linux/Windows</title>
      </sec>
      <sec id="sec-23-4">
        <title>Linux/Windows</title>
      </sec>
      <sec id="sec-23-5">
        <title>Linux/Windows</title>
      </sec>
      <sec id="sec-23-6">
        <title>Unix/Windows/ other</title>
      </sec>
      <sec id="sec-23-7">
        <title>Centos 7</title>
      </sec>
      <sec id="sec-23-8">
        <title>Linux/Windows agents</title>
      </sec>
      <sec id="sec-23-9">
        <title>Linux</title>
      </sec>
      <sec id="sec-23-10">
        <title>Linux</title>
      </sec>
      <sec id="sec-23-11">
        <title>Linux</title>
      </sec>
      <sec id="sec-23-12">
        <title>Linux –</title>
      </sec>
      <sec id="sec-23-13">
        <title>Windows</title>
      </sec>
      <sec id="sec-23-14">
        <title>Windows</title>
      </sec>
      <sec id="sec-23-15">
        <title>Linux</title>
      </sec>
      <sec id="sec-23-16">
        <title>Centos 7 –</title>
      </sec>
      <sec id="sec-23-17">
        <title>Linux/Windows Ubuntu 16 + +</title>
        <p>+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
s
g
o
lf
o
s
e
c
r
u
o
s
n
i
a
M</p>
      </sec>
      <sec id="sec-23-18">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-19">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-20">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-21">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-22">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-23">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-24">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-25">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-26">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-27">
        <title>Json</title>
      </sec>
      <sec id="sec-23-28">
        <title>Windows/</title>
      </sec>
      <sec id="sec-23-29">
        <title>Linux logs</title>
      </sec>
      <sec id="sec-23-30">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-31">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-32">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-33">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-34">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-35">
        <title>Windows/</title>
      </sec>
      <sec id="sec-23-36">
        <title>Linux logs</title>
      </sec>
      <sec id="sec-23-37">
        <title>Windows/</title>
      </sec>
      <sec id="sec-23-38">
        <title>Linux logs</title>
      </sec>
      <sec id="sec-23-39">
        <title>Lots of</title>
      </sec>
      <sec id="sec-23-40">
        <title>Lots of</title>
        <p>not
indicated</p>
      </sec>
      <sec id="sec-23-41">
        <title>Lots of</title>
        <p>Lots of
t
s
o
c
m
e
t
s
y
S</p>
      </sec>
    </sec>
    <sec id="sec-24">
      <title>6. Acknowledgement</title>
      <p>This work is carried out within the framework of research grant №АР06851243 “Methods, models
and tools for security events and incidents management for detecting and preventing cyber attacks on
critical infrastructures of digital economics” (2020–2022), funded by the Ministry of Digital
Development, Innovation and Aerospace Industry of the Republic of Kazakhstan.</p>
    </sec>
    <sec id="sec-25">
      <title>7. References</title>
      <p>[16] Berdibayev R., Gnatyuk S., Yevchenko Yu., Kishchenko V. “A concept of the architecture and
creation for SIEM system in critical infrastructure”, Studies in Systems, Decision and Control,
Vol. 346, 2021, pp. 221-242.
[17] Gnatyuk S., Berdibayev R., Avkurova Z., Verkhovets O., Bauyrzhan M. “Studies on cloud-based
cyber incidents detection and identification in critical infrastructure”, CEUR Workshop
Proceedings, 2021, Vol. 2923, pp. 68-80.
[18] J. Lee, Y. S. Kim, J. H. Kim and I. K. Kim, “Toward the SIEM architecture for cloud-based security
services,” 2017 IEEE Conference on Communications and Network Security (CNS), 2017, pp.
398-399, DOI: 10.1109/CNS.2017.8228696.
[19] Faure, E., Shcherba, A., Vasiliu, Y., Fesenko, A. Cryptographic key exchange method for data
factorial coding (2020) CEUR Workshop Proceedings, 2654, pp. 643-653.
[20] Astapenya V., Buriachok V., Sokolov V., Skladannyi P. and Ageyev D. “Last mile technique for
wireless delivery system using an accelerating lens”, Proceedings of 2020 IEEE International
Conference on Problems of Infocommunications Science and Technology, PIC S and T 2020, pp.
811-814, 2021. DOI:10.1109/PICST51311.2020.946788
[21] V. Kuzmin, M. Zaliskyi, R. Odarchenko, Yu. Petrova, “New Approach to Switching Points
Optimization for Segmented Regression during Mathematical Model Building”, CEUR Workshop
Proceedings, 2022, Vol. 3077, pp. 106-122.
[22] I. Ostroumov and N. Kuzmenko, “Configuration Analysis of European Navigational Aids
Network,” 2021 Integrated Communications Navigation and Surveillance Conference (ICNS),
2021, pp. 1-9, DOI: 10.1109/ICNS52807.2021.9441576.
[23] O. Solomentsev, M. Zaliskyi, O. Shcherbyna, O. Kozhokhina, “Sequential Procedure of
Changepoint Analysis During Operational Data Processing”, Microwave Theory and Techniques in
Wireless Communications, 2020, pp 168-171, DOI: 10.1109/MTTW51045.2020.9245068.
[24] I. Ostroumov, N. Kuzmenko “Compatibility analysis of multi signal processing in APNT with
current navigation infrastructure,” in Telecommunications and Radio Engineering, vol. 77, issue
3, 2018, pp. 211-223.
[25] I. Zhukov, N. Pechurin, L. Kondratova et al, Increasing the accuracy of the information load annual
growth evaluation on the internet of things, CEUR Workshop Proceedings, vol. 2588, 2019, art.
158907.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security rating metrics for distributed wireless systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on "Mathematics. Information Technologies. Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Kipchuk</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , et al.
          <source>Investigation of Availability of Wireless Access Points based on Embedded Systems</source>
          .
          <source>2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T)</source>
          ,
          <year>2019</year>
          . https://doi.org/10.1109/picst47496.
          <year>2019</year>
          .9061551
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bogachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <article-title>Monitoring subsystem for wireless systems based on miniature spectrum analyzers</article-title>
          , in: 2018
          <source>International Scientific-Practical Conference Problems of Infocommunications. Science and Technology</source>
          ,
          <year>2018</year>
          . https://doi.org/10.1109/infocommst.
          <year>2018</year>
          .
          <volume>8632151</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Ariel</given-names>
            <surname>Query Language Guide</surname>
          </string-name>
          ,
          <source>IBM QRadar 7.3.3</source>
          (
          <issue>2013</issue>
          and 2019). Available on: https://www.ibm.com/docs/en/SS42VS_7.3.3/com.ibm.qradar.doc/b_qradar_aql.pdf
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Vielberth</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pernul</surname>
            <given-names>G.</given-names>
          </string-name>
          “
          <article-title>A Security Information and Event Management Pattern”</article-title>
          .
          <source>12th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP</source>
          <year>2018</year>
          ),
          <year>2018</year>
          , p.
          <fpage>27</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Agrawal</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makwana</surname>
            <given-names>H.</given-names>
          </string-name>
          “
          <article-title>A Study on Critical Capabilities for Security Information and Event Management”</article-title>
          .
          <source>International Journal of Science and Research (IJSR)</source>
          . Vol.
          <volume>4</volume>
          <issue>Issue 7</issue>
          ,
          <year>July 2015</year>
          Rock, pp.
          <fpage>1893</fpage>
          -
          <lpage>1896</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Henrik</given-names>
            <surname>Karlzén</surname>
          </string-name>
          , “
          <article-title>An Analysis of Security Information and Event Management Systems”</article-title>
          . University of Gothenburg, Göteborg, Sweden,
          <year>January 2009</year>
          . Available on: http://publications.lib.chalmers.se/records/fulltext/89572.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>SIEM</given-names>
            <surname>Analytics</surname>
          </string-name>
          : http://www.siem.su/compare_SIEM_systems.php
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Kim</surname>
          </string-name>
          , “
          <article-title>Toward the SIEM architecture for cloud-based security services</article-title>
          ,”
          <source>2017 IEEE Conference on Communications and Network Security (CNS)</source>
          ,
          <source>Las Vegas, NV</source>
          <year>2017</year>
          , pp.
          <fpage>398</fpage>
          -
          <lpage>399</lpage>
          , DOI: 10.1109 / CNS.
          <year>2017</year>
          .
          <volume>8228696</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bachane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. I. K.</given-names>
            <surname>Adsi and H. C. Adsi</surname>
          </string-name>
          , “
          <article-title>Real time monitoring of security events for forensic purposes in Cloud environments using SIEM,” 2016</article-title>
          <source>Third International Conference on Systems of Collaboration (SysCo)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          , DOI: 10.1109/SYSCO.
          <year>2016</year>
          .
          <volume>7831327</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B. Al</given-names>
            <surname>Sabbagh</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kowalski</surname>
          </string-name>
          , “
          <article-title>A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM)</article-title>
          ,
          <source>” 2016 European Intelligence and Security Informatics Conference (EISIC)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>195</lpage>
          , DOI: 10.1109/EISIC.
          <year>2016</year>
          .
          <volume>049</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Serckumecka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Medeiros</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessani</surname>
          </string-name>
          , “
          <article-title>Low-Cost Serverless SIEM in the Cloud</article-title>
          ,
          <source>” 2019 38th Symposium on Reliable Distributed Systems (SRDS)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>3811</lpage>
          , DOI: 10.1109/SRDS47363.
          <year>2019</year>
          .
          <volume>00057</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nabil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Soukainat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lakbabi</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Ghizlane</surname>
          </string-name>
          , “
          <article-title>SIEM selection criteria for an efficient contextual security</article-title>
          ,” 2017
          <source>International Symposium on Networks, Computers and Communications (ISNCC)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , DOI: 10.1109/ISNCC.
          <year>2017</year>
          .
          <volume>8072035</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.-V.</given-names>
            <surname>Mahmoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kidmose</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Turkmen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pilawka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.M.</given-names>
            <surname>Pedersen</surname>
          </string-name>
          , “
          <fpage>DefAtt</fpage>
          - Architecture
          <source>of Virtual Cyber Labs for Research and Education”</source>
          ,
          <source>2021 International Conference on Cyber Situational Awareness Data Analytics and Assessment (CyberSA)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Yu</surname>
            . Danik,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Hryschuk</surname>
          </string-name>
          , S. Gnatyuk, “
          <article-title>Synergistic effects of information and cybernetic interaction in civil aviation”</article-title>
          ,
          <source>Aviation</source>
          , Vol.
          <volume>20</volume>
          , №3, рр.
          <fpage>137</fpage>
          -
          <lpage>144</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>