<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rat Berdibayev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Polozhentsev</string-name>
          <email>artem.polozhencev@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Myroslav Ryabyy</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Almaty University of Power Engineering and Telecommunication</institution>
          ,
          <addr-line>126/1 Baytursynuli str., Almaty, 050013</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>11</fpage>
      <lpage>20</lpage>
      <abstract>
        <p>The number of cyber threats in ICT is increasing and the development of new security oriented instrumental tools is very important and relevant scientific task. Security incident and event management (SIEM) systems are category of such tools, directed on log analysis and incident management to prevent negative consequences minimize damage of cyber threats for end user. In the previous works authors have analyzed existed SIEM systems and database types for them as well as created new architecture of cloud-based SIEM. Next step of this research project is enterprise service bus architecture justification. The paper defines the place of distributed data bus in the concept of service oriented architecture, identifies the functions and benefits. Also authors analyzed most popular up-to-date enterprise service bus solutions and provides recommendations in context of developed SIEM implementation in the critical infrastructure. Besides, the data sheet for SIEM in critical infrastructure was formed and proposed in this paper.</p>
      </abstract>
      <kwd-group>
        <kwd>1 SIEM</kwd>
        <kwd>incident management</kwd>
        <kwd>ESB</kwd>
        <kwd>cyber threat</kwd>
        <kwd>cloud-based architecture</kwd>
        <kwd>SOA</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Nowadays, the number of cyber threats is
increasing, this is due to the development of new
information-communication technologies (ICT)
and an insufficiently good level of testing of the
developed software and physical software, as well
as the lack of maintenance and support for
outdated software and server software [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
There are various vulnerabilities in protocols,
software, as well as the architecture of electronic
equipment, which affects the cyber security level
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Many various instruments were developed to
solve mentioned problems and mitigate threats.
One of them is Security Information and Event
Management (SIEM) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], that was created to
prevent the future consequences of the
exploitation of vulnerabilities by undesirable
persons, as well as to minimize damage for the
end user [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of Modern Approaches and Problem Statement</title>
      <p>
        In the paper [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] the basic concept of
cloudbased SIEM architecture (Fig. 1) for different
sectors of critical infrastructure was proposed.
This scheme can also be integrated to real ICT
infrastructures with existed SIEM (proposed by
various vendors [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]) and other incident
management instrumental tools. The main
structural units of proposed SIEM are following:
 Horizontal Databases.
 Blocks of Analytics and Monitoring.
 Cloud Storage.
 Encryptor.
 Message Broker.
 Sources (System 1 – System N).
      </p>
      <p>One of the most important unit of this system
is Encryptor, which creates single block Cloud
Storage by providing confidentiality of the
nonprocessed data after its gathering using syslog,
NetFlow etc. Besides, the Virtual Box sends
gathered and encrypted data Horizontal Databases
via Message Broker. If there is no connection with
Message Broker, the temporary data storage
provides in Cloud Storage.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] the analysis of up-to-date SIEM systems
was carried out; in the paper [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] basic concept of
cloud-based SIEM was developed; in the work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
authors analyzed DB types in context of SIEM
implementation. Next step is enterprise service
bus justification. It will be the main objective of
this research paper.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. ESB Implementation in SOA</title>
    </sec>
    <sec id="sec-4">
      <title>Information Infrastructure</title>
      <p>
        Service Oriented Architecture (SOA) provides
a way to allow multiple usage of software
components through service interfaces (Fig. 2)
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Such interfaces use common communication
standards so they can be quickly integrated into
new applications without the need for in-depth
integration each time.
      </p>
      <p>
        The SOA service contains the code and data
integrations necessary to perform a particular
business function [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Service interfaces are
weakly interacted, meaning that they can be used
even with minimal knowledge on how the
integration is performed. Services are accessed
via standard network protocols, such as SOAP/
HTTP or JSON/HTTP, which send read/modify
data requests. Services are published in such a
way that they allow developers to find and reuse
them to build new applications quickly. These
services can be created from the ground but are
often made by exporting functions from existing
systems as interfaces.
      </p>
      <p>
        In SOA, services can interact with each other
regardless of the type of service. This means that
a particular service may be platform- or
protocolspecific, but SOA allows such services to interact
and exchange data. This data is exchanged
through a distributed data bus or Enterprise
Service Bus (ESB) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], which forms the basis of
any SOA architecture. Thus, the ESB is a template
(Fig. 3) in which a centralized component
integrates with core systems and then accesses
these integrations as service interfaces.
      </p>
      <p>
        It provides data model conversions, strong
interaction, routing, and even multiple query
creation, combining these functions in a single
service interface that can be repeatedly used by
new applications. Typically, the ESB template is
implemented with a specially designed integration
execution environment and tools that are well
suited to perform the above functions as
efficiently as possible [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>In principle, SOA can be implemented without
ESB (Fig. 4), but application owners would have
to find a unique way to provide access to
interfaces which is a very time-consuming task
(even with multiple interfaces), and which will
also make future maintenance very difficult. For
example, ESB can be implemented by using JMS
servers and XML/XSD as a means of transferring
data between different services. Thus, different
services will register or connect to these JMS
servers and exchange data in XML format.
Typically, the SOA suite comes with so-called
adapters that help convert messages to and from a
format the service and XML understands.</p>
      <p>
        Consider a stock trading system as an example.
Messages from the stock exchange come in using
the FIX protocol. It’s possible to create an
application that expects JSON. To make both
systems working, SOA will be used—the FIX
adapter will convert the FIX message into XML,
then that xml will be passed to the JSON adapter
via ESB, which is then converted into JSON as
required by your endpoint system. In Fig. 5 is an
example of a JBoss ESB implementation [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>4. ESB Comparative Analysis</title>
      <p>
        Below let’s consider how ESB components are
implemented and used in the solutions that are
most often offered on the Kazakhstan market
(Talend [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], Mule [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], WSO2 [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], Red Hat
Fuse).
      </p>
      <sec id="sec-5-1">
        <title>Mule</title>
        <p>WSO2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Red Hat Fuse ± +</title>
        <p>Amazon SQS,
JMS support,
Apache Kafka</p>
        <p>Apache
ActiveMQ,
Apache Kafka,
AWS MQ,
RabbitMQ, JMS
support
Apache Log4j- Apache
Log4jbased logging based logging via
via the Apache Apache Commons
Commons Logging library,
Logging library. SLF4J,
System and java.util.logging,
component Elastic
events are
logged
separately
+
+</p>
        <p>Developers also add Apache Kafka (plus
Kafka Connect) and RabbitMQ message brokers
to the list, but these two solutions are not ESB, and
it is not reasonable to consider them within the
scope of this analysis. As criteria let’s choose the
basic functional components of data buses:
whether the studio is, Message Broker Support,
the way of logging and monitoring.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Features of Modern ESB</title>
      <p>The data bus is a set of software that acts as a
single hub for the exchange of messages between
information systems and applications. The service
bus allows for easy configuration of message
paths, stores the history of messages, and records
the path of each message. The basic principles of
it are below:</p>
      <p>1. Any upgrade of an item inevitably requires
a large-scale reworking of the integrations. For
example, an Oracle database update is released,
and all the integrations related to it have to be
reworked.</p>
      <p>2. Event logging in each of the integrations is
implemented differently (if implemented). If data
is lost or comes in with errors, it will be difficult
to trace the time and cause of the error.</p>
      <p>3. Each new element of the system requires a
significant investment in Point-to-Point
integration. For example, to add new trading
platforms, it will be necessary to integrate them
with an online store, CRM, WMS, ERP, PIM, etc.</p>
      <p>4. Business intelligence is becoming more
complex: data is stored in different sources, in
different formats, or duplicated. Combining them
into a convenient tool for making management
decisions is a difficult task.</p>
      <p>5. As the infrastructure increases, the time and
resources required to maintain it increase
accordingly. Also, the reserve of resources to
improve its work decreases.</p>
      <p>6. ESB-bus combines a few functions, which
a “star” topology distributes across integrations or
not implements.</p>
      <p>7. ESB collects information from other
systems: either related to the company’s IT
infrastructure or external. The information is
received in the form and formats in which it is
contained in the source system.</p>
      <p>8. Within the ESB, the data are converted into
the required formats for transmitting to other
systems.</p>
      <p>9. The logic of routes and conversions is set
by the operator: the source of information, the
purpose of conversion and the place of
acceptance.</p>
      <p>10.Logs are saved in the message broker. If
errors or losses occur, it will be possible to
determine the cause of the failure without having
to repeat the incident. Accordingly, errors can be
corrected, and data restored quickly and easily.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Practical Implementation of ESB for Effective Integration of SIEM in Critical Information</title>
    </sec>
    <sec id="sec-8">
      <title>Infrastructure</title>
      <p>
        The developed platform [
        <xref ref-type="bibr" rid="ref15 ref6">6, 15</xref>
        ] applies a
security event correlation mechanism that allows
the platform to be used as a dedicated and fully
functional SIEM system. The platform provides
correlation for normalized logs/events,
searches/queries for threat analysis and sources of
vulnerability factor information and produces
risk-aware alarms. The primary objective is to
collect as many events as possible from the
organization's infrastructure [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>During the digital transformation, companies
(regardless of their size) use multiple information
systems. Frequently, they operate overlapping
data arrays. ESB is designed to integrate different
information systems. The data exchange takes
place via ESB, using various protocols and
formats, allowing to avoid modifications of the
systems being integrated. The use of ESB for
SIEM-class systems is aimed at the balanced
distribution of the load on services and security of
data exchange.</p>
      <p>Consider how services can communicate
directly with each other. To retrieve data from an
application, it is necessary to go through a
complex multi-level chain of operations. There
can be several to dozens or hundreds of such
services. The continuous exchange of messages
between systems can create a heavy load. On the
user side, it will lead to long latency times and
constant application failures (Fig. 6). It is also
worth noting that if one of the systems needs to be
updated, changed, or distributed to other
departments, this will inevitably affect all other
services.</p>
      <p>Using ESB for SIEM-class systems
completely changes the organization of processes
in a company. Namely, applications no longer
need to communicate directly with each other,
instead, each of them interacts only with the
integration platform. This instantly eliminates the
need for a huge number of accesses methods, as
many interfaces as there are services will be
needed. If changes need to be made to one of the
systems, it will not affect the other corporate
applications. The ESB will single-handedly take
on all these tasks (Fig. 7). Thus, this approach,
unlike traditional point-to-point architecture
(where services interact directly with each other),
has more flexibility. Integration scenarios can be
modified with minimal developer intervention.</p>
      <p>The benefits of the solution are as follows: makes
it easier to integrate applications by implementing
ESB for SIEM-class systems saves time and
resources, improves the functioning of services,
and enhances the organization's efficiency and
security.</p>
      <p>To collect information (events) the system
uses its agents installed in monitored subsystems,
as well as standard existing mechanisms for
collecting events (syslog, snmp, etc.). For
network control, it can be used as a collector of
NetFlow statistics received from network
equipment. It can also be used to analyze network
traffic either by mirroring traffic from network
equipment or by sending traffic through itself.</p>
      <p>The system sends events over an encrypted
channel to the message broker. If there is no
connection to the message broker, it ensures
temporary storage of data, minimizing the risks of
losing critical information. Multiple brokers can
be installed in a monitored system. Some
important concepts:
 Message broker should be understood as a
special software which ensures the guaranteed
delivery of messages from multiple sources to
multiple recipients. This is an electronic queue
for messages.
 Repository is a special storage of unprocessed
records in encrypted form. An important part
for collecting legally relevant evidence for
incident investigations.</p>
      <p>
        Horizontally extensible databases are a
distinctive architectural advantage of the
developed platform. The system uses distributed
databases of different types to solve metrics
control (monitoring) and event control (SIEM)
tasks in parallel [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]:
 High speed of processing large streams of
      </p>
      <p>information.
 Minimal delays in data processing.
 Minimal delays for building analytical reports</p>
      <p>and queries.
 High fault tolerance.
 Storage expandability by adding nodes without
database downtime.</p>
      <p>A monitoring module is comprehensive
software for controlling metrics. Usually, such
tasks are called “Monitoring” and are real-time
tracking of quantitative metrics of systems. When
metrics enter risk zones, the module creates a
security violation event. This module has an
interactive graphical interface.</p>
      <p>The analytics module is comprehensive event
analysis software that performs normalization,
correlation, and event analysis. It also finds
dependencies, defines an event as an incident, and
informs other systems. Also, it has an interactive
graphical interface.</p>
      <p>The service-oriented architecture, of which the
developed platform is a part, integrates all APIs,
which ensures end-to-end integration. An API is a
so-called set of rules and conditions for programs
to communicate with each other: input and output
data, and types of operations. The use of an API
significantly simplifies interaction: it ties together
the capabilities of different services, forming
interfaces that are accessible to different users
(Fig. 8).</p>
      <p>Microservice architecture differs from the
traditional ESB approach for SIEM-class systems
because its functionality is organized into small
services, each of them is responsible for a separate
task, is supported by one team, and can work in
isolation from the others. There is no centralized
base with this approach. Each service has its
repository of information. The ESB for
SIEMclass systems, however, serves only as a transport,
being, in essence, just a message broker.</p>
      <p>
        Interaction between the user and the platform
services is also performed via API [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        Taking to account [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5–7</xref>
        ] SIEM data sheet well
be following (Table 2).
      </p>
      <p>Additional requirements are following:
 The Supplier ensures the installation of SIEM
software on physical servers and/or the</p>
      <p>Customer’s virtualization platform.
 The supplier provides the Customer with a
calculation of the resource requirements for
installing SIEM. The calculation is made by
the Supplier based on the performance
requirements specified in this specification (clauses
11.12 in Table 2).
 The customer provides the allocation of
resources in accordance with the specified
calculation, installation and basic
configuration of operating systems (including
configuration of the disk subsystem and
network interfaces) for installing SIEM. The
Supplier shall provide the Customer with an
operating system distribution (on media or in
the form of a download link) and, if necessary,
a license for operating systems.
 The customer provides access from servers to
the Internet during the installation and
configuration of SIEM.
 For the entire duration of the SIEM operation,
the customer provides constant access from the
SIEM servers to the licensing server to control
the license.</p>
      <p>The Supplier, within 10 (ten) calendar days,
completes the installation and configuration of the</p>
      <p>SIEM system.
9 Collecting and SIEM should:
filtering  Support standard methods for collecting event logs: Syslog, Raw/Plaintext,
events GELF, CEF, file event logs (using agents for Linux/Windows).
 Provide analysis of events in real time.
 Provide filtering, as well as display through the user interface of an event</p>
      <p>in real time, where the user can immediately apply filters.
 Be able to save search criteria for quick access in the future.
 Support search by events using the query language (if you use your own</p>
      <p>query language, it should be described in the documentation).
 Provide the user with the opportunity to independently connect event</p>
      <p>sources that are not supported by default or systems of their own design.
 Support data transmission from sources to the control system via a secure</p>
      <p>channel (if there is support for secure transmission in the protocol).
 Support centralized management of agents through the SIEM interface</p>
      <p>(for agents of the Beats family).
10 Account SIEM should:</p>
      <p>Management  Support a role-based management model with a predefined set of roles.
Requirements  Be able to create and use User Groups (Teams).</p>
      <p> Have a token management system for authorization in the API.</p>
      <p>Performance Requirements
11 Events per  Average daily—no more than 200 EPS
second requi-  Maximum in the busiest hour—no more than 400 EPS
rements (EPS)
12 Requirements The daily amount of information stored in the event database is no more than
for informa- 4 GB per day.
tion stored in The storage period for events in the database and/or SIEM archive is at least
the database 3 years.</p>
    </sec>
    <sec id="sec-9">
      <title>7. Conclusions</title>
      <p>The basis of any SOA architecture is the ESB,
the main advantages of which are a wide range of
connectors and scalability of the solution; flexible
data routing; guaranteed delivery of information
messages; organization of a secure transmission
channel; centralized management; ability to
monitor and diagnose the state of transmission;
possibility of integration with third-party message
queues.</p>
      <p>The analysis of modern ESB solutions has
shown that each of the products has its features,
which form the basis of their fields of usage. If a
company wants to use free versions of the
product, Fuse would be the most suitable option
(but it would be necessary to consult developers
for significant revisions). Talend or Mule are good
options in the early stages of a company's
development. WSO2 has the best balance of
functionality and ease of calculating the cost of
the license.</p>
      <p>To implement SIEM in a critical information
infrastructure, a SOA-based distributed data bus
is required. The platform uses distributed
databases of different types to solve metrics and
event control tasks in parallel. This increases
parameters by an order of magnitude, providing
processing speed of large flows of information;
minimal delays for data processing; minimal
delays for analytical reports and queries; high
fault tolerance; storage extensibility by simply
adding nodes without database downtime. The use
of API significantly simplifies interaction: it ties
together the capabilities of different services,
forming interfaces available to different users.</p>
      <p>After concept and DB development, the ESB
was justified as well as data sheet for SIEM in
critical infrastructure was formed and proposed in
this paper.</p>
    </sec>
    <sec id="sec-10">
      <title>8. Acknowledgment</title>
      <p>This work is carried out within the framework
of research grant #АР06851243 “Methods,
models and tools for security events and incidents
management for detecting and preventing
cyberattacks on critical infrastructures of digital
economics” (2020–2022), funded by the Ministry
of Digital Development, Innovation and
Aerospace Industry of the Republic of
Kazakhstan.</p>
    </sec>
    <sec id="sec-11">
      <title>9. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network, in Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2022</issue>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center, in Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          ,
          <year>2022</year>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security rating metrics for distributed wireless systems</article-title>
          ,
          <source>in 8th International Conference on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Skendžić</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kovačić</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Balon</surname>
          </string-name>
          ,
          <article-title>Management and Monitoring Security Events in a Business Organization-SIEM system</article-title>
          ,
          <source>in 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1203</fpage>
          -
          <lpage>1208</lpage>
          , doi: 10.23919/mipro55190.
          <year>2022</year>
          .
          <volume>9803428</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Modern</surname>
            <given-names>SIEM</given-names>
          </string-name>
          <article-title>Analysis and Critical Requirements Definition in the Context of Information Warfare</article-title>
          ,
          <source>in CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          , vol.
          <volume>3188</volume>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Berdibayev</surname>
          </string-name>
          , et al.,
          <article-title>A Concept of the Architecture and Creation for SIEM System in Critical Infrastructure, Studies in Systems, Decision and Control</article-title>
          , vol.
          <volume>346</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>242</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <source>Modern Types of Databases for SIEM System Development, CEUR Workshop Proceedings</source>
          , vol.
          <volume>3187</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Framework for AgentBased Service-Oriented Modelling</surname>
          </string-name>
          ,
          <source>2008 IEEE International Symposium on ServiceOriented System Engineering</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>160</fpage>
          -
          <lpage>165</lpage>
          , doi: 10.1109/SOSE.
          <year>2008</year>
          .
          <volume>15</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Design and Implementation of Software Testing Platform for SOA-Based System</article-title>
          ,
          <source>in IEEE 6th Int. Conf. on Comp. and Commun</source>
          . Syst.,
          <year>2021</year>
          , pp.
          <fpage>1094</fpage>
          -
          <lpage>1098</lpage>
          , doi: 10.1109/icccs52626.
          <year>2021</year>
          .
          <volume>9449221</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>ESB (Enterprise Service Bus</surname>
          </string-name>
          ), https://www.ibm.com/cloud/learn/esb.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <article-title>Design and implementation of ESB based on SOA in power system</article-title>
          ,
          <source>in 4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT)</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>519</fpage>
          -
          <lpage>522</lpage>
          , doi: 10.1109/drpt.
          <year>2011</year>
          .
          <volume>5993946</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sreemathy</surname>
          </string-name>
          , et al.,
          <article-title>Data Integration in ETL Using TALEND</article-title>
          ,
          <source>in 6th International Conference on Advanced Computing and Communication Systems</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1444</fpage>
          -
          <lpage>1448</lpage>
          , doi: 10.1109/ICACCS48705.
          <year>2020</year>
          .
          <volume>9074186</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>X.</given-names>
            <surname>Mkhwanazi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Le</surname>
          </string-name>
          , E. Blake,
          <article-title>Clustering between Data Mules for Better Message Delivery</article-title>
          ,
          <source>in 26th Int. Conf. on Advanced Information Networking and Applications Workshops</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>209</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kumara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gamage</surname>
          </string-name>
          ,
          <article-title>Towards Reusing ESB Services in Different ESB Architectures</article-title>
          ,
          <source>in IEEE 34th Annual Computer Software and Applications Conference Workshops</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>30</lpage>
          , doi: 10.1109/compsacw.
          <year>2010</year>
          .
          <volume>15</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <source>Cloud-Based Cyber Incidents Response System and Software Tools, Communications in Computer and Information Science</source>
          , vol.
          <volume>1486</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Laue</surname>
          </string-name>
          , et al.,
          <article-title>A SIEM Architecture for Multidimensional Anomaly Detection</article-title>
          ,
          <source>in 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>136</fpage>
          -
          <lpage>142</lpage>
          , doi: 10.1109/IDAACS53288.
          <year>2021</year>
          .
          <volume>9660903</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Asef</surname>
          </string-name>
          , et al.,
          <article-title>SIEMS: A Secure Intelligent Energy Management System for Industrial IoT applications</article-title>
          ,
          <source>in IEEE Transactions on Industrial Informatics</source>
          , doi: 10.1109/tii.
          <year>2022</year>
          .
          <volume>3165890</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Orsós</surname>
          </string-name>
          , et al.,
          <source>Log Collection and SIEM for 5G SOC, in IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics (SAMI)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>152</lpage>
          , doi: 10.1109/sami54271.
          <year>2022</year>
          .
          <volume>9780759</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>