<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sergiy</forename><surname>Gnatyuk</surname></persName>
							<email>s.gnatyuk@nau.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rat</forename><surname>Berdibayev</surname></persName>
							<email>r.berdybaev@aues.kz</email>
							<affiliation key="aff1">
								<orgName type="institution">Almaty University of Power Engineering and Telecommunication</orgName>
								<address>
									<addrLine>126/1 Baytursynuli str</addrLine>
									<postCode>050013</postCode>
									<settlement>Almaty</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Viktoriia</forename><surname>Sydorenko</surname></persName>
							<email>v.sydorenko@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Artem</forename><surname>Polozhentsev</surname></persName>
							<email>artem.polozhencev@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Myroslav</forename><surname>Ryabyy</surname></persName>
							<email>m.riabyi@nau.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>October 13</addrLine>
									<postCode>2022</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F093E65386AE7749FC82687F14E3AD76</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:42+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>SIEM, incident management, ESB, cyber threat, cloud-based architecture, SOA (M. Ryabyy) ORCID: 0000-0003-4992-0564 (S. Gnatyuk)</term>
					<term>0000-0002-8341-9645 (R. Berdibayev)</term>
					<term>0000-0002-5910-0837 (V. Sydorenko)</term>
					<term>0000-0003-0139-0752 (A. Polozhentsev)</term>
					<term>0000-0002-9651-9135 (M. Ryabyy)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The number of cyber threats in ICT is increasing and the development of new security oriented instrumental tools is very important and relevant scientific task. Security incident and event management (SIEM) systems are category of such tools, directed on log analysis and incident management to prevent negative consequences minimize damage of cyber threats for end user. In the previous works authors have analyzed existed SIEM systems and database types for them as well as created new architecture of cloud-based SIEM. Next step of this research project is enterprise service bus architecture justification. The paper defines the place of distributed data bus in the concept of service oriented architecture, identifies the functions and benefits. Also authors analyzed most popular up-to-date enterprise service bus solutions and provides recommendations in context of developed SIEM implementation in the critical infrastructure. Besides, the data sheet for SIEM in critical infrastructure was formed and proposed in this paper.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Nowadays, the number of cyber threats is increasing, this is due to the development of new information-communication technologies (ICT) and an insufficiently good level of testing of the developed software and physical software, as well as the lack of maintenance and support for outdated software and server software <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. There are various vulnerabilities in protocols, software, as well as the architecture of electronic equipment, which affects the cyber security level <ref type="bibr" target="#b2">[3]</ref>. Many various instruments were developed to solve mentioned problems and mitigate threats. One of them is Security Information and Event Management (SIEM) <ref type="bibr" target="#b3">[4]</ref>, that was created to prevent the future consequences of the exploitation of vulnerabilities by undesirable persons, as well as to minimize damage for the end user <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of Modern Approaches and Problem Statement</head><p>In the paper <ref type="bibr" target="#b5">[6]</ref> the basic concept of cloudbased SIEM architecture (Fig. <ref type="figure" target="#fig_0">1</ref>) for different sectors of critical infrastructure was proposed. This scheme can also be integrated to real ICT infrastructures with existed SIEM (proposed by various vendors <ref type="bibr" target="#b4">[5]</ref>) and other incident management instrumental tools. The main structural units of proposed SIEM are following:  Horizontal Databases.  Blocks of Analytics and Monitoring.  Cloud Storage.  Encryptor.  Message Broker.  Sources (System 1 -System N). One of the most important unit of this system is Encryptor, which creates single block Cloud Storage by providing confidentiality of the nonprocessed data after its gathering using syslog, NetFlow etc. Besides, the Virtual Box sends gathered and encrypted data Horizontal Databases via Message Broker. If there is no connection with Message Broker, the temporary data storage provides in Cloud Storage.</p><p>In <ref type="bibr" target="#b4">[5]</ref> the analysis of up-to-date SIEM systems was carried out; in the paper <ref type="bibr" target="#b5">[6]</ref> basic concept of cloud-based SIEM was developed; in the work <ref type="bibr" target="#b6">[7]</ref> authors analyzed DB types in context of SIEM implementation. Next step is enterprise service bus justification. It will be the main objective of this research paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">ESB Implementation in SOA Information Infrastructure</head><p>Service Oriented Architecture (SOA) provides a way to allow multiple usage of software components through service interfaces (Fig. <ref type="figure">2</ref>) <ref type="bibr" target="#b7">[8]</ref>. Such interfaces use common communication standards so they can be quickly integrated into new applications without the need for in-depth integration each time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Scheme of the SOA construction</head><p>The SOA service contains the code and data integrations necessary to perform a particular business function <ref type="bibr" target="#b8">[9]</ref>. Service interfaces are weakly interacted, meaning that they can be used even with minimal knowledge on how the integration is performed. Services are accessed via standard network protocols, such as SOAP/ HTTP or JSON/HTTP, which send read/modify data requests. Services are published in such a way that they allow developers to find and reuse them to build new applications quickly. These services can be created from the ground but are often made by exporting functions from existing systems as interfaces.</p><p>In SOA, services can interact with each other regardless of the type of service. This means that a particular service may be platform-or protocolspecific, but SOA allows such services to interact and exchange data. This data is exchanged through a distributed data bus or Enterprise Service Bus (ESB) <ref type="bibr" target="#b9">[10]</ref>, which forms the basis of any SOA architecture. Thus, the ESB is a template (Fig. <ref type="figure">3</ref>) in which a centralized component integrates with core systems and then accesses these integrations as service interfaces.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: The ESB bus layout</head><p>It provides data model conversions, strong interaction, routing, and even multiple query creation, combining these functions in a single service interface that can be repeatedly used by new applications. Typically, the ESB template is implemented with a specially designed integration execution environment and tools that are well suited to perform the above functions as efficiently as possible <ref type="bibr" target="#b10">[11]</ref>.</p><p>In principle, SOA can be implemented without ESB (Fig. <ref type="figure" target="#fig_1">4</ref>), but application owners would have to find a unique way to provide access to interfaces which is a very time-consuming task (even with multiple interfaces), and which will also make future maintenance very difficult. For example, ESB can be implemented by using JMS servers and XML/XSD as a means of transferring data between different services. Thus, different services will register or connect to these JMS servers and exchange data in XML format. Typically, the SOA suite comes with so-called adapters that help convert messages to and from a format the service and XML understands. Consider a stock trading system as an example. Messages from the stock exchange come in using the FIX protocol. It's possible to create an application that expects JSON. To make both systems working, SOA will be used-the FIX adapter will convert the FIX message into XML, then that xml will be passed to the JSON adapter via ESB, which is then converted into JSON as required by your endpoint system. In Fig. <ref type="figure" target="#fig_2">5</ref> is an example of a JBoss ESB implementation <ref type="bibr" target="#b8">[9]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">ESB Comparative Analysis</head><p>Below let's consider how ESB components are implemented and used in the solutions that are most often offered on the Kazakhstan market (Talend <ref type="bibr" target="#b11">[12]</ref>, Mule <ref type="bibr" target="#b12">[13]</ref>, WSO2 <ref type="bibr" target="#b13">[14]</ref>, Red Hat Fuse). Developers also add Apache Kafka (plus Kafka Connect) and RabbitMQ message brokers to the list, but these two solutions are not ESB, and it is not reasonable to consider them within the scope of this analysis. As criteria let's choose the basic functional components of data buses: whether the studio is, Message Broker Support, the way of logging and monitoring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Features of Modern ESB</head><p>The data bus is a set of software that acts as a single hub for the exchange of messages between information systems and applications. The service bus allows for easy configuration of message paths, stores the history of messages, and records the path of each message. The basic principles of it are below:</p><p>1. Any upgrade of an item inevitably requires a large-scale reworking of the integrations. For example, an Oracle database update is released, and all the integrations related to it have to be reworked.</p><p>2. Event logging in each of the integrations is implemented differently (if implemented). If data is lost or comes in with errors, it will be difficult to trace the time and cause of the error.</p><p>3. Each new element of the system requires a significant investment in Point-to-Point integration. For example, to add new trading platforms, it will be necessary to integrate them with an online store, CRM, WMS, ERP, PIM, etc.</p><p>4. Business intelligence is becoming more complex: data is stored in different sources, in different formats, or duplicated. Combining them into a convenient tool for making management decisions is a difficult task.</p><p>5. As the infrastructure increases, the time and resources required to maintain it increase accordingly. Also, the reserve of resources to improve its work decreases.</p><p>6. ESB-bus combines a few functions, which a "star" topology distributes across integrations or not implements.</p><p>7. ESB collects information from other systems: either related to the company's IT infrastructure or external. The information is received in the form and formats in which it is contained in the source system.</p><p>8. Within the ESB, the data are converted into the required formats for transmitting to other systems. 9. The logic of routes and conversions is set by the operator: the source of information, the purpose of conversion and the place of acceptance.</p><p>10. Logs are saved in the message broker. If errors or losses occur, it will be possible to determine the cause of the failure without having to repeat the incident. Accordingly, errors can be corrected, and data restored quickly and easily.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Practical Implementation of ESB for Effective Integration of SIEM in Critical Information Infrastructure</head><p>The developed platform <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b14">15]</ref> applies a security event correlation mechanism that allows the platform to be used as a dedicated and fully functional SIEM system. The platform provides correlation for normalized logs/events, searches/queries for threat analysis and sources of vulnerability factor information and produces risk-aware alarms. The primary objective is to collect as many events as possible from the organization's infrastructure <ref type="bibr" target="#b15">[16]</ref>.</p><p>During the digital transformation, companies (regardless of their size) use multiple information systems. Frequently, they operate overlapping data arrays. ESB is designed to integrate different information systems. The data exchange takes place via ESB, using various protocols and formats, allowing to avoid modifications of the systems being integrated. The use of ESB for SIEM-class systems is aimed at the balanced distribution of the load on services and security of data exchange.</p><p>Consider how services can communicate directly with each other. To retrieve data from an application, it is necessary to go through a complex multi-level chain of operations. There can be several to dozens or hundreds of such services. The continuous exchange of messages between systems can create a heavy load. On the user side, it will lead to long latency times and constant application failures (Fig. <ref type="figure">6</ref>). It is also worth noting that if one of the systems needs to be updated, changed, or distributed to other departments, this will inevitably affect all other services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 6: Interaction of services without a bus</head><p>Using ESB for SIEM-class systems completely changes the organization of processes in a company. Namely, applications no longer need to communicate directly with each other, instead, each of them interacts only with the integration platform. This instantly eliminates the need for a huge number of accesses methods, as many interfaces as there are services will be needed. If changes need to be made to one of the systems, it will not affect the other corporate applications. The ESB will single-handedly take on all these tasks (Fig. <ref type="figure">7</ref>). Thus, this approach, unlike traditional point-to-point architecture (where services interact directly with each other), has more flexibility. Integration scenarios can be modified with minimal developer intervention.</p><p>The benefits of the solution are as follows: makes it easier to integrate applications by implementing ESB for SIEM-class systems saves time and resources, improves the functioning of services, and enhances the organization's efficiency and security.</p><p>To collect information (events) the system uses its agents installed in monitored subsystems, as well as standard existing mechanisms for collecting events (syslog, snmp, etc.). For network control, it can be used as a collector of NetFlow statistics received from network equipment. It can also be used to analyze network traffic either by mirroring traffic from network equipment or by sending traffic through itself.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 7: Service interaction with the bus</head><p>The system sends events over an encrypted channel to the message broker. If there is no connection to the message broker, it ensures temporary storage of data, minimizing the risks of losing critical information. Multiple brokers can be installed in a monitored system. Some important concepts:  Message broker should be understood as a special software which ensures the guaranteed delivery of messages from multiple sources to multiple recipients. This is an electronic queue for messages.  Repository is a special storage of unprocessed records in encrypted form. An important part for collecting legally relevant evidence for incident investigations. Horizontally extensible databases are a distinctive architectural advantage of the developed platform. The system uses distributed databases of different types to solve metrics control (monitoring) and event control (SIEM) tasks in parallel <ref type="bibr" target="#b16">[17]</ref>:  High speed of processing large streams of information.  Minimal delays in data processing.  Minimal delays for building analytical reports and queries.  High fault tolerance.  Storage expandability by adding nodes without database downtime.</p><p>A monitoring module is comprehensive software for controlling metrics. Usually, such tasks are called "Monitoring" and are real-time tracking of quantitative metrics of systems. When metrics enter risk zones, the module creates a security violation event. This module has an interactive graphical interface.</p><p>The analytics module is comprehensive event analysis software that performs normalization, correlation, and event analysis. It also finds dependencies, defines an event as an incident, and informs other systems. Also, it has an interactive graphical interface.</p><p>The service-oriented architecture, of which the developed platform is a part, integrates all APIs, which ensures end-to-end integration. An API is a so-called set of rules and conditions for programs to communicate with each other: input and output data, and types of operations. The use of an API significantly simplifies interaction: it ties together the capabilities of different services, forming interfaces that are accessible to different users (Fig. <ref type="figure">8</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 8. SOA service to bus interaction</head><p>Microservice architecture differs from the traditional ESB approach for SIEM-class systems because its functionality is organized into small services, each of them is responsible for a separate task, is supported by one team, and can work in isolation from the others. There is no centralized base with this approach. Each service has its repository of information. The ESB for SIEMclass systems, however, serves only as a transport, being, in essence, just a message broker. Interaction between the user and the platform services is also performed via API <ref type="bibr" target="#b17">[18]</ref>.</p><p>Taking to account <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref> SIEM data sheet well be following (Table <ref type="table">2</ref>).</p><p>Additional requirements are following:  The Supplier ensures the installation of SIEM software on physical servers and/or the Customer's virtualization platform.  The supplier provides the Customer with a calculation of the resource requirements for installing SIEM. The calculation is made by the Supplier based on the performance require-ments specified in this specification (clauses 11.12 in Table <ref type="table">2</ref>).  The customer provides the allocation of resources in accordance with the specified calculation, installation and basic configuration of operating systems (including configuration of the disk subsystem and network interfaces) for installing SIEM. The Supplier shall provide the Customer with an operating system distribution (on media or in the form of a download link) and, if necessary, a license for operating systems.  The customer provides access from servers to the Internet during the installation and configuration of SIEM.  For the entire duration of the SIEM operation, the customer provides constant access from the SIEM servers to the licensing server to control the license. The Supplier, within 10 (ten) calendar days, completes the installation and configuration of the SIEM system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>Data sheet information security and event management system N Name Description Information security event monitoring system and real-time incident detection (SIEM) 1 Special purpose</p><p>The IS event monitoring system and real-time incident detection (hereinafter referred to as SIEM) is designed to monitor and analyze IS events and must:  Carry out centralized collection, storage and processing of events of system logs (logs), as well as network flows from various systems of the Customer's infrastructure.  Identify important events and IS incidents in the total mass of data, which should allow the Customer's IS specialists (hereinafter referred to as the Customer's personnel) to concentrate on the most serious incidents and respond to them in a timely manner.  Inform the Customer's personnel about identified information security incidents by sending messages to e-mail.  Support standard methods for collecting event logs: Syslog, Raw/Plaintext, GELF, CEF, file event logs (using agents for Linux/Windows).  Provide analysis of events in real time.  Provide filtering, as well as display through the user interface of an event in real time, where the user can immediately apply filters.  Be able to save search criteria for quick access in the future.  Support search by events using the query language (if you use your own query language, it should be described in the documentation).  Provide the user with the opportunity to independently connect event sources that are not supported by default or systems of their own design.  Support data transmission from sources to the control system via a secure channel (if there is support for secure transmission in the protocol).  Support centralized management of agents through the SIEM interface (for agents of the Beats family). The daily amount of information stored in the event database is no more than 4 GB per day. The storage period for events in the database and/or SIEM archive is at least 3 years.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusions</head><p>The basis of any SOA architecture is the ESB, the main advantages of which are a wide range of connectors and scalability of the solution; flexible data routing; guaranteed delivery of information messages; organization of a secure transmission channel; centralized management; ability to monitor and diagnose the state of transmission; possibility of integration with third-party message queues.</p><p>The analysis of modern ESB solutions has shown that each of the products has its features, which form the basis of their fields of usage. If a company wants to use free versions of the product, Fuse would be the most suitable option (but it would be necessary to consult developers for significant revisions). Talend or Mule are good options in the early stages of a company's development. WSO2 has the best balance of functionality and ease of calculating the cost of the license.</p><p>To implement SIEM in a critical information infrastructure, a SOA-based distributed data bus is required. The platform uses distributed databases of different types to solve metrics and event control tasks in parallel. This increases parameters by an order of magnitude, providing processing speed of large flows of information; minimal delays for data processing; minimal delays for analytical reports and queries; high fault tolerance; storage extensibility by simply adding nodes without database downtime. The use of API significantly simplifies interaction: it ties together the capabilities of different services, forming interfaces available to different users.</p><p>After concept and DB development, the ESB was justified as well as data sheet for SIEM in critical infrastructure was formed and proposed in this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Acknowledgment</head><p>This work is carried out within the framework of research grant #АР06851243 "Methods,</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Proposed cloud-based SIEM architecture concept</figDesc><graphic coords="2,72.00,72.00,405.31,259.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: SOA Comparison with and without ESB</figDesc><graphic coords="3,72.00,594.25,332.88,85.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: JBoss ESB implementation example</figDesc><graphic coords="4,72.00,78.00,400.90,291.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="6,72.00,72.00,422.77,154.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="6,72.00,467.81,448.20,155.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="7,72.00,312.33,413.26,131.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 ESB</head><label>1</label><figDesc></figDesc><table><row><cell></cell><cell cols="2">comparative analysis</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">No. ESB /</cell><cell>Talend</cell><cell>Mule</cell><cell>WSO2</cell><cell>Red Hat Fuse</cell></row><row><cell></cell><cell>Criteria</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>1</cell><cell>Studio</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>±</cell></row><row><cell>2</cell><cell>Message</cell><cell>JMS 1.1, Microsoft</cell><cell>Anypoint MQ, IBM</cell><cell>Amazon SQS,</cell><cell>Apache</cell></row><row><cell></cell><cell>Broker</cell><cell>MQ 3.0, JBoss</cell><cell>MQ,</cell><cell>JMS support,</cell><cell>ActiveMQ,</cell></row><row><cell></cell><cell>Support</cell><cell>Messaging 1.4.4,</cell><cell>Apache Kafka, JMS</cell><cell>Apache Kafka</cell><cell>Apache Kafka,</cell></row><row><cell></cell><cell></cell><cell>IBM MQ 8.0, Apache</cell><cell>1.0.2, 1.1, 2.0 support</cell><cell></cell><cell>AWS MQ,</cell></row><row><cell></cell><cell></cell><cell>ActiveMQ 5.13.2</cell><cell></cell><cell></cell><cell>RabbitMQ, JMS</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>support</cell></row><row><cell>3</cell><cell>Logging</cell><cell>statistics on the</cell><cell>logging within each</cell><cell>Apache Log4j-</cell><cell>Apache Log4j-</cell></row><row><cell></cell><cell></cell><cell>execution of tasks</cell><cell>integration created in</cell><cell>based logging</cell><cell>based logging via</cell></row><row><cell></cell><cell></cell><cell>and components,</cell><cell>Mule: errors and</cell><cell>via the Apache</cell><cell>Apache Commons</cell></row><row><cell></cell><cell></cell><cell>errors, warnings and</cell><cell>events mandatory for</cell><cell>Commons</cell><cell>Logging library,</cell></row><row><cell></cell><cell></cell><cell>exceptions at the</cell><cell>logging by integration</cell><cell>Logging library.</cell><cell>SLF4J,</cell></row><row><cell></cell><cell></cell><cell>task level, data flow</cell><cell>logic; logging starting,</cell><cell>System and</cell><cell>java.util.logging,</cell></row><row><cell></cell><cell></cell><cell>within tasks; logging</cell><cell>stopping, deploying,</cell><cell>component</cell><cell>Elastic</cell></row><row><cell></cell><cell></cell><cell>in Elastic, Apache</cell><cell>and disconnecting</cell><cell>events are</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Log4j, Apache</cell><cell>Mule services and</cell><cell>logged</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Commons Logging,</cell><cell>integrations</cell><cell>separately</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Trace Logs</cell><cell></cell><cell></cell><cell></cell></row><row><cell>4</cell><cell>Monitoring</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>Allow the creation of graphical panels (dashboards) using any events, with automatic updating at a given interval.  Support the creation of new graphical panels or modification of existing ones using a "wizard," by method that does not require the use of programming languages.  Allow the saving of graphical panels for collective use. The graphic panels of the module must support various types of data presentation: tables, pie and line charts, etc. The graphic panels of the module should function automatically, without the need for regular maintenance by the operator.  Display graphical panels via WEB.</figDesc><table><row><cell>9 Collecting and</cell><cell>SIEM should:</cell></row><row><cell>filtering</cell><cell></cell></row><row><cell>events</cell><cell></cell></row><row><cell>2 Centralized</cell><cell>SIEM should provide centralized management of all its components and</cell></row><row><cell>Management</cell><cell>functionality through a single graphical Web interface.</cell></row><row><cell>3 Data</cell><cell>SIEM should:</cell></row><row><cell>visualization (Dashboards)</cell><cell>  Interface.</cell></row><row><cell>4 API support</cell><cell>SIEM should: have an open software interface API for possibility integration</cell></row><row><cell></cell><cell>with other Modules.</cell></row><row><cell>5 Support for</cell><cell>SIEM should support the following methods to provide user authentication</cell></row><row><cell>authentication</cell><cell>and authorization:</cell></row><row><cell>and</cell><cell> Local user base.</cell></row><row><cell>authorization</cell><cell> Active Directory.</cell></row><row><cell></cell><cell> LDAP.</cell></row><row><cell></cell><cell> Tokens (for API access).</cell></row><row><cell>6 Update</cell><cell>The SIEM must support the ability to automatically and/or manually update</cell></row><row><cell></cell><cell>as new versions are released.</cell></row><row><cell>7 Fault</cell><cell>The SIEM database must be able to support a cluster organization in the</cell></row><row><cell>Tolerance</cell><cell>amount of at least two nodes (node)</cell></row><row><cell>8 Scaling</cell><cell>SIEM should:</cell></row><row><cell></cell><cell>▪ Provide horizontal scaling by adding hardware and, if necessary,</cell></row><row><cell></cell><cell>purchasing additional licenses for SIEM in accordance with the current (at</cell></row><row><cell></cell><cell>the time of scaling) licensing policy.</cell></row><row><cell></cell><cell>▪ Have an event storage component (database) in which the following</cell></row><row><cell></cell><cell>functions are implemented:</cell></row><row><cell></cell><cell>• Scaling without a fixed limit on the volume of event storage (adding</cell></row><row><cell></cell><cell>additional equipment if necessary).</cell></row><row><cell></cell><cell>• Fault-tolerant implementation.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>Support a role-based management model with a predefined set of roles.  Be able to create and use User Groups (Teams).  Have a token management system for authorization in the API.</figDesc><table><row><cell>10 Account</cell><cell>SIEM should:</cell></row><row><cell cols="2">Management Requirements  Performance Requirements</cell></row><row><cell>11 Events per</cell><cell> Average daily-no more than 200 EPS</cell></row><row><cell>second requi-</cell><cell> Maximum in the busiest hour-no more than 400 EPS</cell></row><row><cell>rements (EPS)</cell><cell></cell></row><row><cell>12 Requirements</cell><cell></cell></row><row><cell>for informa-</cell><cell></cell></row><row><cell>tion stored in</cell><cell></cell></row><row><cell>the database</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>models and tools for security events and incidents management for detecting and preventing cyberattacks on critical infrastructures of digital economics" (2020-2022), funded by the Ministry of Digital Development, Innovation and Aerospace Industry of the Republic of Kazakhstan.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Decentralized Access Demarcation System Construction in Situational Center Network</title>
		<author>
			<persName><forename type="first">V</forename><surname>Grechaninov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems II</title>
		<imprint>
			<biblScope unit="volume">3188</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="197" to="206" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center</title>
		<author>
			<persName><forename type="first">V</forename><surname>Grechaninov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Emerging Technology Trends on the Smart Industry and the Internet of Things</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3149</biblScope>
			<biblScope unit="page" from="107" to="117" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Security rating metrics for distributed wireless systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Conference on &quot;Mathematics. Information Technologies. Education</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2386</biblScope>
			<biblScope unit="page" from="222" to="233" />
		</imprint>
	</monogr>
	<note>Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Management and Monitoring Security Events in a Business Organization-SIEM system</title>
		<author>
			<persName><forename type="first">A</forename><surname>Skendžić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kovačić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Balon</surname></persName>
		</author>
		<idno type="DOI">10.23919/mipro55190.2022.9803428</idno>
	</analytic>
	<monogr>
		<title level="m">45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="1203" to="1208" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">3188</biblScope>
			<biblScope unit="page" from="149" to="166" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A Concept of the Architecture and Creation for SIEM System in Critical Infrastructure</title>
		<author>
			<persName><forename type="first">R</forename><surname>Berdibayev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Studies in Systems, Decision and Control</title>
		<imprint>
			<biblScope unit="volume">346</biblScope>
			<biblScope unit="page" from="221" to="242" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Modern Types of Databases for SIEM System Development</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">CEUR Workshop Proceedings</title>
		<imprint>
			<biblScope unit="volume">3187</biblScope>
			<biblScope unit="page" from="127" to="138" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A Framework for Agent-Based Service-Oriented Modelling</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Jin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<idno type="DOI">10.1109/SOSE.2008.15</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Symposium on Service-Oriented System Engineering</title>
				<imprint>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="160" to="165" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Design and Implementation of Software Testing Platform for SOA-Based System</title>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1109/icccs52626.2021.9449221</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 6th Int. Conf. on Comp. and Commun. Syst</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1094" to="1098" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="https://www.ibm.com/cloud/learn/esb" />
		<title level="m">ESB (Enterprise Service Bus</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Design and implementation of ESB based on SOA in power system</title>
		<author>
			<persName><forename type="first">P</forename><surname>Dai</surname></persName>
		</author>
		<idno type="DOI">10.1109/drpt.2011.5993946</idno>
	</analytic>
	<monogr>
		<title level="m">4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="519" to="522" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Data Integration in ETL Using TALEND</title>
		<author>
			<persName><forename type="first">J</forename><surname>Sreemathy</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICACCS48705.2020.9074186</idno>
	</analytic>
	<monogr>
		<title level="m">6th International Conference on Advanced Computing and Communication Systems</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1444" to="1448" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Clustering between Data Mules for Better Message Delivery</title>
		<author>
			<persName><forename type="first">X</forename><surname>Mkhwanazi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Blake</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">26th Int. Conf. on Advanced Information Networking and Applications Workshops</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="209" to="214" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Towards Reusing ESB Services in Different ESB Architectures</title>
		<author>
			<persName><forename type="first">I</forename><surname>Kumara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gamage</surname></persName>
		</author>
		<idno type="DOI">10.1109/compsacw.2010.15</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 34th Annual Computer Software and Applications Conference Workshops</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="25" to="30" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Cloud-Based Cyber Incidents Response System and Software Tools</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<imprint>
			<biblScope unit="volume">1486</biblScope>
			<biblScope unit="page" from="169" to="184" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A SIEM Architecture for Multidimensional Anomaly Detection</title>
		<author>
			<persName><forename type="first">T</forename><surname>Laue</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS53288.2021.9660903</idno>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="136" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">SIEMS: A Secure Intelligent Energy Management System for Industrial IoT applications</title>
		<author>
			<persName><forename type="first">P</forename><surname>Asef</surname></persName>
		</author>
		<idno type="DOI">10.1109/tii.2022.3165890</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Industrial Informatics</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Log Collection and SIEM for 5G SOC</title>
		<author>
			<persName><forename type="first">M</forename><surname>Orsós</surname></persName>
		</author>
		<idno type="DOI">10.1109/sami54271.2022.9780759</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics (SAMI)</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="147" to="152" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
