=Paper= {{Paper |id=Vol-3188/paper14 |storemode=property |title=Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare |pdfUrl=https://ceur-ws.org/Vol-3188/paper14.pdf |volume=Vol-3188 |authors=Sergiy Gnatyuk,Rat Berdibayev,Andriy Fesenko,Olha Kyryliuk,Anatoly Bessalov |dblpUrl=https://dblp.org/rec/conf/cpits/GnatyukBFKB21 }} ==Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare== https://ceur-ws.org/Vol-3188/paper14.pdf
Modern SIEM Analysis and Critical Requirements Definition
in the Context of Information Warfare
Sergiy Gnatyuk1, Rat Berdibayev2, Andriy Fesenko3, Olha Kyryliuk4, and Anatoly Bessalov5

1
  National Aviation University, 1 Liubomyr Huzar ave., Kyiv, 03058, Ukraine
2
  Almaty University of Power Engineering and Telecommunication, 126/1 Baytursynuli str., Almaty, 050013, Kazakhstan
3
  Taras Shevchenko National University of Kyiv, 60 Volodymyrska str., Kyiv, 01033, Ukraine
4
  Volodymyr Vynnychenko Central Ukrainian State Pedagogical University, 1 Shevchenka str., Kropyvnytskyi,
  25000, Ukraine
5
  Borys Grinchenko Kyiv University, 18/2 Bulvarno-Kudravska str., Kyiv, 04053, Ukraine

                Abstract
                Today Security Information and Event Management (SIEM) systems are used to prevent
                information loss in computer systems and networks. There are many approaches to SIEM
                realization. This paper is devoted to the analysis of existing SIEM and their characteristics
                in accordance with international standards and specifications, as well as a comparative
                description of their capabilities and differences, advantages and disadvantages. These
                results will be used in research project realization devoted to open source SIEM
                development and implementation in critical infrastructure to improve the cybersecurity
                level in the context of information warfare and cyber threats realization.

                Keywords1
                SIEM, firewall, IDS, cyber attack, cyber monitoring, security management, risk management,
                information warfare.

1. Introduction
    Today, the number of cyber threats is increasing, this is due to the development of new technologies
and an insufficiently good level of testing of the developed software and physical software, as well as
the lack of maintenance and support for outdated software and server software. Because of this, there
are various vulnerabilities in protocols, software, as well as the architecture of electronic equipment,
which affects the security of information on the entire global Internet network, both local and public
[1,2].
    Therefore, to correct these security flaws, systems for real-time event monitoring and incident
management, well-known as SIEM (security information and event management), were created in order
to prevent the future consequences of the exploitation of vulnerabilities by undesirable persons, as well
as to minimize damage to the end user. In the current article, we will consider the existing SIEM
systems, consider their structure, and also conduct a comparative analysis of their capabilities and
differences, advantages and disadvantages, and compliance with international standards and
specifications. Consider the main security and incident management systems further [3].

2. Main Characteristics of SIEM
   For certification, all SIEM systems must comply with the international group of information security
standards: ISO / IEC 27000 PCI-DSS, HIPAA, NIST 800-171, DoD, RMF, GDPR.

CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, October 26, 2021, Kyiv, Ukraine
EMAIL: s.gnatyuk@nau.edu.ua (S. Gnatyuk); r.berdybaev@aues.kz (R. Berdibayev); aafesenko88@gmail.com (A. Fesenko);
kyryluk@ukr.net (O. Kyryliuk); a.bessalov@kubg.edu.ua (A. Bessalov)
ORCID: 0000-0003-4992-0564 (S. Gnatyuk); 0000-0002-8341-9645 (R. Berdibayev); 0000-0001-5154-5324 (A. Fesenko); 0000-0002-9764-
8756 (O. Kyryliuk); 0000-0002-6967-5001 (A. Bessalov)
             ©️ 2022 Copyright for this paper by its authors.
             Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
             CEUR Workshop Proceedings (CEUR-WS.org)



                                                                             149
   To solve problems related to security and fixing events of a SIEM system, consider the main
functionality of SIEM systems:
     Data aggregation: data log management; data is collected from various sources.
     Correlation: finding common attributes, linking events to meaningful clusters.
     Alert: automated analysis of correlated events and generation of notifications (alarms) about
        current problems (e-mail, GSM-gateway, applications on the phone).
     Display facilities: displays graphs to help identify work anomalies using prepared patterns.
     Compatibility: using add-ons to automate data collection, create reports to adapt aggregated
        data to existing information security management and audit processes.
     Data storage: the use of long-term data storage in historical order to correlate data over time
        and for further computer forensics and investigation of network incidents.
     Expert analysis: the ability to search through a variety of journals on various nodes, including
        for software and technical expertise.

3. Analysis of Modern SIEM Systems
   Based on these characteristics, we have analyzed up-to-date SIEM systems and compare their
capabilities. It was the main objective of this research study.

3.1. IBM QRadar Security Intelligence Platform
   IBM QRadar Security Intelligence Platform [4] consists of a number of integrated systems for event
collection, monitoring, security analysis and incident investigation:
   1. Log Manager.
   2. SIEM.
   3. Flow Processor.
   4. Vulnerability Manager.
   5. Risk Manager.
   6. Network Insights.
   7. Watson Advisor for Cyber Security.
   8. Packet Capture and Incidents Forensics.
   QRadar allows you to collect and process information about information security events from
security audit logs, analyze network statistics (NetFlow, etc.), independently analyze network traffic
and transmitted information, build a network topology and emulate changes in configuration files of
network equipment, identify vulnerabilities and unsafe settings systems, completely capture traffic and
recreate a chain of communications between network nodes.
   Benefits of the IBM QRadar Security Intelligence Platform (Fig. 1):
    A unified platform for the systematic creation of SOC: collection and analysis of information
       security events, detection of abnormal network activity, scanning of vulnerabilities and
       identification of unsafe configurations, integration with artificial intelligence IBM Watson,
       network forensics and transition to incident response processes in IBM Resilient.
    Flexible architecture of QRadar Platform, which allows you to redefine the role and functions
       of platform modules and does not limit client companies to rigid frameworks of a once-selected
       scheme.
    A large number of free applications, content and integration modules.




                                                 150
Figure 1: IBM QRadar Security Intelligence Administrator GUI

3.2. logRhythm
    LogRhythm [5], as a platform, offers an intelligent security solution that uses artificial intelligence
to analyze logs and traffic on Windows and Linux systems (Fig. 2).
    System advantages:
      has an expandable data storage;
      suitable for systems where there is no structured data, no centralized visibility or automation;
      suitable for small and medium-sized organizations;
      allows you to filter out useless information or other logs and narrow the analysis down to the
         network level;
      Compatible with a wide range of logs and devices, and seamlessly integrates with Varonis to
         enhance threat and incident response capabilities.




Figure 2: LogRhythm Administrator GUI



                                                   151
3.3. HPE ArcSight
   Hewlett Packard Enterprise (HPE) ArcSight is the most widespread SIEM system in the East-
European market [6].
   HPE ArcSight is targeted at midsize to large enterprises and service providers (Fig. 3).
   The HPE ArcSight platform can be deployed as a device, software, or virtual instance. HPE ArcSight
supports a scalable n-tier architecture with HPE ArcSight Management Center.
   HPE ArcSight benefits:
     Arcsight ESM provides a complete set of SIEM capabilities that can be used to support a
        large-scale SOC, including a complete incident investigation and management workflow, and
        a dedicated deployment management console.
     HPE User Behavior Analytics identifies anomalies based on user behavior analysis and
        complements traditional correlation, which is the core function of arcsight.
     DNS Malware Analytics analyzes DNS traffic and provides complete visibility of the IT
        infrastructure, which helps to identify network vulnerabilities even before attackers take
        advantage of them.
     Arcsight Threat Central contains an online threat knowledge base and allows you to share
        information on how to detect and eliminate them.




Figure 3: Analytics of user and entity behavior in HPE ArcSight

3.4. Splunk
   Splunk is a tool that leverages the power of artificial intelligence and machine learning to deliver
actionable, effective, and predictive insights (Fig. 4).
   Splunk [5,7] is suitable for all types of organizations for both on-premises and SaaS deployments.
Key benefits:
    Fast threat detection.
    Identification and assessment of risks.
    Management of alerts.
    Ordering events.
    Fast and efficient response.
    Works with data from any machine, both on-premises and in the cloud infrastructure.




                                                 152
Figure 4: Splunk admin GUI

3.5. McAfee Enterprise Security Manager
   McAfee Enterprise Security Manager (ESM) [5] is delivered as physical and virtual devices and
software. The three main components that make up SIEM are ESM, Event Receiver and Enterprise Log
Manager, which can be deployed together as a single instance or separately for distributed or large-
scale environments (Figure 5).
   McAfee Enterprise Security Manager benefits:
    Enterprise Security Manager has good coverage of Industrial Control Systems (ICS) and
       Supervisory Control and Data Acquisition (SCADA) devices.
    McAfee Data Exchange Layer (DXL) from Intel Security provides non-API integration with
       third-party technologies. This approach makes it possible to use ESM as a SIEM platform.
    McAfee Global Threat Intelligence extends Enterprise Security Manager's SIEM system by
       adding a source of continuously updated threat intelligence, enabling rapid detection of events
       involving communications with suspicious or malicious IP addresses.




Figure 5: McAfee Enterprise Security Manager Administrator GUI


                                                 153
3.6. Alien Vault USM
   Alient Vault USM is a comprehensive information security management platform that centralizes
and simplifies threat detection, incident response, and compliance management in cloud and on-
premises environments (Fig. 6).




Figure 6: AlienVault interface

   Key features of AlienApps [6]:
    Extract and analyze security data from third-party applications.
    Visualize external data in graphical USM Anywhere information dashboards with many
     functions.
    Manage third-party security solutions based on threat intelligence analyzed in USM Anywhere.
    Leverage progressive security features as new AlienApps modules are added to USM
     Anywhere.

3.7. FortiSIEM
    FortiSIEM is a comprehensive, scalable security, performance, and compliance management tool
for all infrastructure components, capable of working with both the cloud and the Internet of Things
(IoT) [15–18]. The FortiSIEM solution [5] is aimed at reducing the complexity of detecting threats
while increasing the effectiveness of the security system and exchanging information with the product,
including about discovered vulnerabilities (Fig. 7.).




Figure 7: FortiSIEM in the Fortinet Security Fabric concept



                                                 154
   Key features of FortiSIEM (Fig. 8):
    Scalable and flexible log collection.
    Incident notification and management.
    Providing the user with fully functional custom dashboards.
    Integration of external threat data.
    Providing a scalable analysis function.
    Set baselines and identify statistical anomalies in endpoint /server/user behavior.
    Integration of external technologies.




Figure 8: FortiSIEM architecture

3.8. Ixia ThreatARMOR
   Key features (Fig. 9):
    Ensuring full bandwidth.
    Eliminate threats by blocking all traffic from known malicious sites and untrusted countries.
    Elimination of the possibility of false positives - visual confirmation of malicious actions for all
     blocked sites.
    Improved processing efficiency by reducing the number of safety alerts.
    Threat Intelligence updates every 5 minutes using Cloud Update Subscription (ATI).
    Quick identification of compromised internal systems.
    Blocking the connection with the captured ip-addresses.
    Dual power redundancy and built-in bypass capability for maximum reliability.
    Easy 30-minute setup with no further adjustments or maintenance, and centralized management
     from the cloud.
    Increases the return on investment and performance of the network security infrastructure [7].




Figure 9: FortiSIEM architecture


                                                  155
3.9. MozDef (Mozilla Defense Platform)
    The Mozilla SIEM system MozDef [7] is used to automate security incident handling. The system
is designed from scratch for maximum performance, scalability and fault tolerance, with a microservice
architecture - each service runs in a Docker container (Fig. 10).
    Benefits:
     Does not use agents - works with standard JSON logs.
     Easily scalable due to microservice architecture.
     Supports cloud service data sources including AWS CLOUDTRAIL and GUARDDUTY.




Figure 10: Mozdef interface

3.10. Wazuh
   System advantages (Fig. 11):
    Based and compatible with the popular SIEM OSSEC.
    Supports various installation options: DOCKER, PUPPET, CHEF, ANSIBLE.
    Supports monitoring of cloud services including AWS and AZURE.
    Includes a comprehensive set of rules to detect many types of attacks and allows them to be
      compared in accordance with PCI DSS V3.1 and CIS.
    Integrates with the SPLUNK log storage and analysis system, event visualization and API
      support [8].




Figure 11: Wazuh interface


                                                 156
3.11. Prelude OSS
    Prelude OSS (Fig. 12) solution is a flexible modular SIEM system that supports many log formats,
integration with third-party tools such as OSSEC, Snort and Suricata network detection system.
Advantages [8,9]:
     A time-tested system in development since 1998.
     Supports many different log formats.
     Normalizes data to IMDEF format, making it easy to transfer data to other security systems.




Figure 12: Prelude OSS interface

3.12. Sagan
   System advantages (Fig. 13):
    Fully compatible with SNORT database, rules, and user interface.
    Multi-threaded architecture provides high performance [8].




Figure 13: Sagan interface



                                                157
3.13. Maxpatrol
   The advantages of this system (Fig. 14):
    Modularity of the product providing high scalability and performance.
    Deep integration of the SIEM system with the MAXPATROL security analysis tool.
    Correlation rules are resistant to changes in its infrastructure.
    Vendor’s willingness to connect any source of logs.
    An event normalization system that allows you to search for events using various structured data.
    Customer customization support—the ability to create your own event filters, correlation rules,
     collection profiles.
    The ability to distribute incidents among employees, track the status of investigations and
     conduct work processes within the SIEM system.




Figure 14: Maxpatrol interface


3.14. SOLARWINDS
    SolarWinds (Fig. 15) has great capabilities for managing logs and reporting, responding to incidents
in real time [5,10].
    Main features of the system:
     Fast detection of suspicious actions and threats.
     Continuous monitoring of the security status.
     Determining the time of the event.
     Compliance with DSS, HIPAA, SOX, PCI, STIG, DISA and other regulations.
     Solarwinds’ solution is suitable for small and large businesses. It has both on-premises and cloud
       Deployment options and runs on Windows and Linux.




                                                  158
Figure 15: Solarwinds interface

3.15. ANAGEENGINE
EventLog Analyzer ManateEngine is a SIEM solution that focuses on analyzing various logs and
extracting various performance and security information from them (Fig. 16).




Figure 16: ANAGEENGINE interface

   Target areas include key sites and applications such as web servers, DHCP servers, databases, print
servers, mail services, etc.
   In addition, the ManageEngine analyzer, which runs on Windows and Linux systems, is useful for
bringing systems into compliance with data protection standards such as PCI, HIPPA, DSS, ISO 27001,
etc. [9,11].




                                                 159
3.16. EventTracker
   Key features of the SIEM EventTracker platform (Fig. 17):
   1. Real-time alert and incident response. EventTracker generates rule-based alerts with dashboard
      updates and fix recommendations.
   2. Search and forensic analysis. Logs are indexed in Elastic Search using an extensible shared
      indexing model.
   3. Making report. The reporting module includes over 1,500 predefined security and compliance
      reports. Full support is included for PCI-DSS, HIPAA, ISO 27001, NIST 800-171, DoD, RMF,
      GDPR and more.
   4. Behavior analysis and correlation. EventTracker quickly detects and tracks changes in systems
      and user behavior. Real-time processing and correlation gives a complete picture of what's new
      and different.
   5. Threat analysis. EventTracker integrates with valuable threat data streams from ecosystem
      partners and open source vendors to provide fast and accurate threat detection to your network
      [5,12].

3.17. Micro Focus ArcSight
    Micro Focus ArcSight is a cybersecurity product that provides big data security analytics and
intelligence software for information security and event management (SIEM) and account management.
    Real-time threat detection and response supported by efficient, intelligent open source SIEM
(security information and event management) software. Micro Focus ArcSight is a cybersecurity
product that provides big data security analytics and intelligence software for information security and
event management (SIEM) and account management [6,13].




Figure 17: EventTracker interface


                                                  160
3.18. Trustwave SIEM Enterprise
   Trustwave benefits:
    Users of other Trustwave security products will benefit from improved bi-directional integration
      with technologies in their portfolio that support automatic response capabilities, such as isolating
      compromised endpoints or blocking user accounts;
    Trustwave SIEM Enterprise (Fig. 18) has one of the simplest architectures, which reduces the
      load on clients during deployment and subsequent expansion [10].




Figure 18: Graphical Administrator Interface Trustwave SIEM Enterprise

3.19. BlackStratus SIEM Storm
   The BlackStratus SIEMStorm device provides flexible threat visualization and mitigation tools
across distributed networks. SIEMStorm integrates with existing network and security equipment,
providing the following advanced features [10,14]:
   1. Extended architecture. Blackstratus Siemstorm provides full failover and tiered redundancy to
      meet complex regulatory requirements, business continuity and risk management.
   2. Real-time visualization of the attack. Identify zero-day attacks using complex metrics based on
      rules, vulnerabilities, statistical and historical correlations.
   3. Correlation of vulnerability. Integrate data from CVE-compliant intrusion detection systems,
      eliminate false positives and free your team to focus on real threats
   4. Transparency. Gain unprecedented visibility across distributed networks to correlate activity in
      separate network environments, identify hidden threats, suspicious trends, and other potentially
      harmful behavior
   5. Making report. Blackstratus Siemstorm provides easy reporting for iso, pci, hipaa, sox and other
      compliance standards

3.20. RSA NetWitness Suite (EMC)
   RSA NetWitness Suite provides threat visibility using data from security events and other log
sources, full packet capture, NetFlow, and endpoints (via RSA NetWitness Endpoint).
   RSA NetWitness is focused on real-time monitoring, analysis, and alerting in addition to proactive
threat support and incident response and forensic investigation [5,14].
   Benefits of RSA NetWitness Suite:


                                                  161
    The rsa netwitness platform brings together threat detection and event monitoring analytics,
     investigation and analysis of threats in network traffic, endpoints and other sources of security
     events and logs.
    Modular deployment options allow customers to choose to monitor network traffic and monitor
     and analyze events and logs as needed.
    RSA LIVE provides a simple and automated approach to ensure uninterrupted delivery of threat
     intelligence, content and other updates.

4. Comparative Analysis of SIEM Systems
   Fig. 19 demonstrates results of the detailed analysis of SIEM systems for the following characteristics:
   1. Audit and verification for compliance with standards.
   2. Complete system / log processing system.
   3. Assessment of the security of the resources of the controlled system.
   4. Checking the compliance of the IS management system with existing requirements and standards.
   5. Information security risk management [17–19].
   6. Collection and storage of incoming security events.
   7. Processing and analysis of registered security events [22–24].
   8. Detection of attacks and violations of security policies in real time.
   9. Identification and analysis of security incidents.
   10. The ability to investigate incidents.
   11. Search for vulnerabilities.
   12. Formation of reports.
   13. Support for working with clouds [15–18].
   14. Support for working with Big Data platforms [25].
   15. Possibilities of integration with new systems.
   16. Advanced search and data visualization capabilities.
   17. User friendly interface.
   18. Supported operating systems.
   19. The main sources of logs.
   20. System cost.

5. Conclusion
    In this paper, we reviewed existing modern SIEM systems, their functionality, the basic principle of
their operation, and also conducted a comparative analysis of each of them, their capabilities and
differences, advantages and disadvantages of use. An analysis was also carried out for compliance with
international specifications and standardizations in this sphere.
    Based on the analysis, we can declare that the FortiSIEM system is the most optimal. Systems IBM
QRadar, LOGRHYTHM, according to the selection criteria, also gain a large number of points, but are
expensive and not available for many companies. Also, developers should pay their attention on the
open source solutions specified in Table 1 and 2.
    In the future these results will be used in research project realization devoted to open source SIEM
development and implementation in critical infrastructure to improve the cybersecurity level in the
context of information warfare and cyber threats realization.




                                                   162
Table 1
Multicriteria analysis of SIEM systems (part 1)




                                                    Complete System (PS) / Log Processing




                                                                                                                                                                             Information security risk management




                                                                                                                                                                                                                                                                                                                                   Identification and analysis of security
                                                                                                                                                                                                                                                      Processing and analysis of registered
                                                                                                                                      Verification of compliance of the IS
                                                                                               resources at the controlled system




                                                                                                                                      management system with existing




                                                                                                                                                                                                                                                                                              Detect attacks and security policy
                                                                                                Assessment of the security of the




                                                                                                                                                                                                                                                                                                                                                                             Incident investigation capability
                                                                                                                                                                                                                    Collecting and storing incoming
                                                                                                                                         requirements and standards
                             Audit and Compliance




                                                                                                                                                                                                                                                                                                   violations in real time
                                                                                                                                                                                                                             security events



                                                                                                                                                                                                                                                                security events
                                                               System (SOL)




                                                                                                                                                                                                                                                                                                                                                  incidents
        System name




 IBM QRadar                     +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 LOGRHYTHM                      +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 HPEArcSight                    +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 Splunk                         +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 McAfee (ESM)                   +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 AlienVault USM                 +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 Alien Vault OS SIM             –                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              ±
 FoniSlEM                       +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 Ixia ThreatARMOR               +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 MozDef                         +                        PS                                       –                                             +                                  –                                           +                                   +                                      +                                      +                              +
 Wazuh                          +                        PS                                 not indicated                                       +                                  –                                           +                                   +                                      +                                      +                              +
 Prelude OSS                    +                        PS                                 not indicated                                       +                                  +                                           +                                   +                                      +                                      +                              +
 Prelude SIEM                   +                        PS                                 not indicated                                       +                                  +                                           +                                   +                                      +                                      +                              +
 Sasan                          –                       SOL                                       –                                             –                                  –                                           +                                   +                                      +                                      +                              +
 Maxpatrol                      +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 SolarWinds                     +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 ManateEnaine                   +                       SOL                                       –                                             +                                  –                                           +                                   +                                      +                                      +                              +
 EventTracker                   +                        PS                                       –                                             +                                  –                                           +                                   +                                      +                                      +                              +
 Micro Focus ArcSight           +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 Trustwave SIEM Enterprise      +                        PS                                       –                                             +                                  +                                           +                                   +                                      –                                      +                              +
 BlackStratus SIEMStonn         +                        PS                                       –                                             +                                  –                                           +                                   +                                      +                                      +                              +
 Searchlnfonn SIEM              +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +
 RuSIEM                         +                        PS                                       +                                             +                                  +                                           +                                   +                                      +                                      +                              +




                                                                                                                                    163
Table 2
Multicriteria analysis of SIEM systems (part 2)




                                                                                                                                  Possibilities of integration with new
                                                                                              Support for working with Big Data




                                                                                                                                                                                                                                    Supported operating systems
                                                                                                                                                                          Advanced search and data
                             Search for vulnerabilities




                                                                                                                                                                                                     User friendly interface




                                                                                                                                                                                                                                                                     Main sources of logs
                                                                                                                                            systems tomorrow
                                                          Report generation

                                                                              Cloud support




                                                                                                                                                                                visualization




                                                                                                                                                                                                                                                                                                 System cost
                                                                                                          platforms
          System name




 IBM QRadar                      +                           +                  +                        +                                  +                                    +                   +                              linux                          Lots of                    $ 63000 +
 LOGRHYTHM                       +                           +                  +                        +                                  +                                    +                   +                         linux/windows                       Lots of                    $ 28000 +
                                                                                                                                                                                                                                                                                                 500
 HPEArcSight                     +                           +                  +                        +                                  +                                    +                   +                             linux                           Lots of                    thousand
                                                                                                                                                                                                                                                                                               rubles +
                                                                                                                                                                                                                                                                                            Free 500 mb
 Splunk                          +                           +                  +                        +                                  +                                    +                   +                         Unix/Windows                        Lots of                  S 5.000 for 1
                                                                                                                                                                                                                                                                                                GB day
 McAfee (ESM)                    +                           +                  +                        +                                  +                                    +                   +                            Windows                          Lots of                   $ 261000 +
 AlienVault USM                  +                           +                  +                        +                                  +                                    +                   +                         Linux/Windows                       Lots of                  $ 1075/mo.
 Alien Vault OS SIM              +                           +                  –                        –                                  –                                    +                   +                         Linux/Windows                       Lots of                       free
 FoniSlEM                        +                           +                  +                        +                                  +                                    +                   +                         Linux/Windows                       Lots of                     $ 900 +
                                                                                                                                                                                                                               Unix/Windows/
 Ixia ThreatARMOR                +                           +                  –                        –                                  +                                    +                   +                                                             Lots of                  £ 3158/year
                                                                                                                                                                                                                                    other
 MozDef                          –                           +                  +                        +                                  +                                    +                   +                            Centos 7                           Json                       free
                                                                                                                                                                                                                                                                  Windows/
 Wazuh                           +                           +                  +                        +                                  +                                    +                   +                             Linux                                                        free
                                                                                                                                                                                                                                                                  Linux logs
 Prelude OSS                     +                           +                  –                        –                                  –                                    +                   +                             Linux                            Lots of                     free
 Prelude SIEM                    +                           +                  –                        –                                  –                                    +                   +                             Linux                            Lots of                       9
 Sasan                           –                           +                  –                        –                                  –                                    +                   –                             Linux                            Lots of                     free
                                                                                                                                                                                                                                                                                                RUB
 Maxpatrol                       +                           +                  +                        +                                  +                                    +                   +                                  –                          Lots of
                                                                                                                                                                                                                                                                                            1,840,000 +
                                                                                                                                                                                                                               Linux/Windows
 SolarWinds                      +                           +                  +                        +                                  +                                    +                   +                                                             Lots of                   2.055 € +
                                                                                                                                                                                                                                   agents
                                                                                                                                                                                                                                                                  Windows/
 ManateEnaine                    +                           +                  –                        –                                  –                                    +                   +                           Windows                                                      $ 1000 +
                                                                                                                                                                                                                                                                  Linux logs
                                                                                                                                                                                                                                                                  Windows/
 EventTracker                    +                           +                  +                        +                                  –                                    +                   +                           Windows                                                       $8995
                                                                                                                                                                                                                                                                  Linux logs
                                                                                                                                                                                                                                                                                                500
 Micro Focus ArcSight            +                           +                  +                        +                                  +                                    +                   +                             Linux                           Lots of                   thousand
                                                                                                                                                                                                                                                                                              rubles +
 Trustwave SIEM Enterprise       +                           +                  +                        +                                  –                                    +                   +                           Centos 7                           Lots of                 $1000/year
                                                                                                                                                                                                                                                                     not
 BlackStratus SIEMStonn          +                           +                  –                        –                                  –                                    +                   +                                  –                                                          –
                                                                                                                                                                                                                                                                  indicated
 Searchlnfonn SIEM               +                           +                  +                        +                                  +                                    +                   +                         Linux/Windows                        Lots of                 Negotiable
 RuSIEM                          +                           +                  –                        –                                  +                                    +                   +                            Ubuntu 16                         Lots of                 Paid/no fee




                                                                                                                                              164
6. Acknowledgement
     This work is carried out within the framework of research grant №АР06851243 “Methods, models
and tools for security events and incidents management for detecting and preventing cyber attacks on
critical infrastructures of digital economics” (2020–2022), funded by the Ministry of Digital
Development, Innovation and Aerospace Industry of the Republic of Kazakhstan.

7. References
[1] V. Buriachok, V. Sokolov, P. Skladannyi, Security rating metrics for distributed wireless systems,
     in: Workshop of the 8th International Conference on "Mathematics. Information Technologies.
     Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS), vol.
     2386, 222–233, 2019.
[2] Kipchuk, F., et al. Investigation of Availability of Wireless Access Points based on Embedded
     Systems. 2019 IEEE International Scientific-Practical Conference Problems of
     Infocommunications,          Science       and       Technology      (PIC      S&T),        2019.
     https://doi.org/10.1109/picst47496.2019.9061551
[3] I. Bogachuk, V. Sokolov, V. Buriachok, Monitoring subsystem for wireless systems based on
     miniature spectrum analyzers, in: 2018 International Scientific-Practical Conference Problems of
     Infocommunications.                Science             and          Technology,             2018.
     https://doi.org/10.1109/infocommst.2018.8632151.
[4] Ariel Query Language Guide, IBM QRadar 7.3.3 (2013 and 2019). Available on:
     https://www.ibm.com/docs/en/SS42VS_7.3.3/com.ibm.qradar.doc/b_qradar_aql.pdf
[5] Vielberth M. and Pernul G. “A Security Information and Event Management Pattern”. 12th Latin
     American Conference on Pattern Languages of Programs (SugarLoafPLoP 2018), 2018, p. 27.
[6] Agrawal K., Makwana H. “A Study on Critical Capabilities for Security Information and Event
     Management”. International Journal of Science and Research (IJSR). Vol. 4 Issue 7, July 2015
     Rock, pp. 1893-1896.
[7] Henrik Karlzén, “An Analysis of Security Information and Event Management Systems”.
     University of Gothenburg, Göteborg, Sweden, January 2009. Available on:
     http://publications.lib.chalmers.se/records/fulltext/89572.pdf
[8] SIEM Analytics: http://www.siem.su/compare_SIEM_systems.php
[9] J. Lee, Y. Kim, J. Kim and I. Kim, “Toward the SIEM architecture for cloud-based security
     services,” 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas,
     NV 2017, pp. 398-399, DOI: 10.1109 / CNS.2017.8228696.
[10] I. Bachane, Y. I. K. Adsi and H. C. Adsi, “Real time monitoring of security events for forensic
     purposes in Cloud environments using SIEM,” 2016 Third International Conference on Systems
     of Collaboration (SysCo), 2016, pp. 1-3, DOI: 10.1109/SYSCO.2016.7831327.
[11] B. Al Sabbagh and S. Kowalski, “A Framework and Prototype for A Socio-Technical Security
     Information and Event Management System (ST-SIEM),” 2016 European Intelligence and
     Security Informatics Conference (EISIC), 2016, pp. 192-195, DOI: 10.1109/EISIC.2016.049.
[12] A. Serckumecka, I. Medeiros and A. Bessani, “Low-Cost Serverless SIEM in the Cloud,” 2019
     38th Symposium on Reliable Distributed Systems (SRDS), 2019, pp. 381-3811,
     DOI: 10.1109/SRDS47363.2019.00057.
[13] M. Nabil, S. Soukainat, A. Lakbabi and O. Ghizlane, “SIEM selection criteria for an efficient
     contextual security,” 2017 International Symposium on Networks, Computers and
     Communications (ISNCC), 2017, pp. 1-6, DOI: 10.1109/ISNCC.2017.8072035.
[14] R.-V. Mahmoud, E. Kidmose, A. Turkmen, O. Pilawka, J.M. Pedersen, “DefAtt - Architecture of
     Virtual Cyber Labs for Research and Education”, 2021 International Conference on Cyber
     Situational Awareness Data Analytics and Assessment (CyberSA), pp. 1-7, 2021.
[15] Yu. Danik, R. Hryschuk, S. Gnatyuk, “Synergistic effects of information and cybernetic interaction
     in civil aviation”, Aviation, Vol. 20, №3, рр. 137-144, 2016.




                                                 165
[16] Berdibayev R., Gnatyuk S., Yevchenko Yu., Kishchenko V. “A concept of the architecture and
     creation for SIEM system in critical infrastructure”, Studies in Systems, Decision and Control,
     Vol. 346, 2021, pp. 221-242.
[17] Gnatyuk S., Berdibayev R., Avkurova Z., Verkhovets O., Bauyrzhan M. “Studies on cloud-based
     cyber incidents detection and identification in critical infrastructure”, CEUR Workshop
     Proceedings, 2021, Vol. 2923, pp. 68-80.
[18] J. Lee, Y. S. Kim, J. H. Kim and I. K. Kim, “Toward the SIEM architecture for cloud-based security
     services,” 2017 IEEE Conference on Communications and Network Security (CNS), 2017, pp.
     398-399, DOI: 10.1109/CNS.2017.8228696.
[19] Faure, E., Shcherba, A., Vasiliu, Y., Fesenko, A. Cryptographic key exchange method for data
     factorial coding (2020) CEUR Workshop Proceedings, 2654, pp. 643-653.
[20] Astapenya V., Buriachok V., Sokolov V., Skladannyi P. and Ageyev D. “Last mile technique for
     wireless delivery system using an accelerating lens”, Proceedings of 2020 IEEE International
     Conference on Problems of Infocommunications Science and Technology, PIC S and T 2020, pp.
     811-814, 2021. DOI:10.1109/PICST51311.2020.946788
[21] V. Kuzmin, M. Zaliskyi, R. Odarchenko, Yu. Petrova, “New Approach to Switching Points
     Optimization for Segmented Regression during Mathematical Model Building”, CEUR Workshop
     Proceedings, 2022, Vol. 3077, pp. 106-122.
[22] I. Ostroumov and N. Kuzmenko, “Configuration Analysis of European Navigational Aids
     Network,” 2021 Integrated Communications Navigation and Surveillance Conference (ICNS),
     2021, pp. 1-9, DOI: 10.1109/ICNS52807.2021.9441576.
[23] O. Solomentsev, M. Zaliskyi, O. Shcherbyna, O. Kozhokhina, “Sequential Procedure of
     Changepoint Analysis During Operational Data Processing”, Microwave Theory and Techniques in
     Wireless Communications, 2020, pp 168-171, DOI: 10.1109/MTTW51045.2020.9245068.
[24] I. Ostroumov, N. Kuzmenko “Compatibility analysis of multi signal processing in APNT with
     current navigation infrastructure,” in Telecommunications and Radio Engineering, vol. 77, issue
     3, 2018, pp. 211-223.
[25] I. Zhukov, N. Pechurin, L. Kondratova et al, Increasing the accuracy of the information load annual
     growth evaluation on the internet of things, CEUR Workshop Proceedings, vol. 2588, 2019, art.
     158907.




                                                  166