=Paper=
{{Paper
|id=Vol-3288/paper2
|storemode=property
|title=Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure
|pdfUrl=https://ceur-ws.org/Vol-3288/paper2.pdf
|volume=Vol-3288
|authors=Sergiy Gnatyuk,Rat Berdibayev,Viktoriia Sydorenko,Artem Polozhentsev,Myroslav Ryabyy
|dblpUrl=https://dblp.org/rec/conf/cpits/GnatyukBSPR22
}}
==Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure==
Enterprise Service Bus Construction in SOA Architecture
for SIEM Implementation in Critical Information Infrastructure
Sergiy Gnatyuk1, Rat Berdibayev2, Viktoriia Sydorenko1, Artem Polozhentsev1,
and Myroslav Ryabyy1
1
National Aviation University, 1 Liubomyra Huzara ave., Kyiv, 03058, Ukraine
2
Almaty University of Power Engineering and Telecommunication, 126/1 Baytursynuli str., Almaty, 050013,
Kazakhstan
Abstract
The number of cyber threats in ICT is increasing and the development of new security
oriented instrumental tools is very important and relevant scientific task. Security incident
and event management (SIEM) systems are category of such tools, directed on log analysis
and incident management to prevent negative consequences minimize damage of cyber
threats for end user. In the previous works authors have analyzed existed SIEM systems
and database types for them as well as created new architecture of cloud-based SIEM. Next
step of this research project is enterprise service bus architecture justification. The paper
defines the place of distributed data bus in the concept of service oriented architecture,
identifies the functions and benefits. Also authors analyzed most popular up-to-date
enterprise service bus solutions and provides recommendations in context of developed
SIEM implementation in the critical infrastructure. Besides, the data sheet for SIEM in
critical infrastructure was formed and proposed in this paper.
Keywords 1
SIEM, incident management, ESB, cyber threat, cloud-based architecture, SOA.
1. Introduction 2. Analysis of Modern Approaches
and Problem Statement
Nowadays, the number of cyber threats is
increasing, this is due to the development of new In the paper [6] the basic concept of cloud-
information-communication technologies (ICT) based SIEM architecture (Fig. 1) for different
and an insufficiently good level of testing of the sectors of critical infrastructure was proposed.
developed software and physical software, as well This scheme can also be integrated to real ICT
as the lack of maintenance and support for infrastructures with existed SIEM (proposed by
outdated software and server software [1, 2]. various vendors [5]) and other incident
There are various vulnerabilities in protocols, management instrumental tools. The main
software, as well as the architecture of electronic structural units of proposed SIEM are following:
equipment, which affects the cyber security level Horizontal Databases.
[3]. Many various instruments were developed to
Blocks of Analytics and Monitoring.
solve mentioned problems and mitigate threats.
Cloud Storage.
One of them is Security Information and Event
Management (SIEM) [4], that was created to Encryptor.
prevent the future consequences of the Message Broker.
exploitation of vulnerabilities by undesirable Sources (System 1 – System N).
persons, as well as to minimize damage for the
end user [6].
CPITS-2022: Cybersecurity Providing in Information and Telecommunication Systems, October 13, 2022, Kyiv, Ukraine
EMAIL: s.gnatyuk@nau.edu.ua (S. Gnatyuk); r.berdybaev@aues.kz (R. Berdibayev); v.sydorenko@ukr.net (V. Sydorenko);
artem.polozhencev@gmail.com (A. Polozhentsev); m.riabyi@nau.edu.ua (M. Ryabyy)
ORCID: 0000-0003-4992-0564 (S. Gnatyuk); 0000-0002-8341-9645 (R. Berdibayev); 0000-0002-5910-0837 (V. Sydorenko);
0000-0003-0139-0752 (A. Polozhentsev); 0000-0002-9651-9135 (M. Ryabyy)
©️ 2022 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
11
Figure 1: Proposed cloud-based SIEM architecture concept
One of the most important unit of this system bus justification. It will be the main objective of
is Encryptor, which creates single block Cloud this research paper.
Storage by providing confidentiality of the non-
processed data after its gathering using syslog, 3. ESB Implementation in SOA
NetFlow etc. Besides, the Virtual Box sends
gathered and encrypted data Horizontal Databases
Information Infrastructure
via Message Broker. If there is no connection with
Message Broker, the temporary data storage Service Oriented Architecture (SOA) provides
provides in Cloud Storage. a way to allow multiple usage of software
In [5] the analysis of up-to-date SIEM systems components through service interfaces (Fig. 2)
was carried out; in the paper [6] basic concept of [8]. Such interfaces use common communication
cloud-based SIEM was developed; in the work [7] standards so they can be quickly integrated into
authors analyzed DB types in context of SIEM new applications without the need for in-depth
implementation. Next step is enterprise service integration each time.
Figure 2: Scheme of the SOA construction
12
The SOA service contains the code and data often made by exporting functions from existing
integrations necessary to perform a particular systems as interfaces.
business function [9]. Service interfaces are In SOA, services can interact with each other
weakly interacted, meaning that they can be used regardless of the type of service. This means that
even with minimal knowledge on how the a particular service may be platform- or protocol-
integration is performed. Services are accessed specific, but SOA allows such services to interact
via standard network protocols, such as SOAP/ and exchange data. This data is exchanged
HTTP or JSON/HTTP, which send read/modify through a distributed data bus or Enterprise
data requests. Services are published in such a Service Bus (ESB) [10], which forms the basis of
way that they allow developers to find and reuse any SOA architecture. Thus, the ESB is a template
them to build new applications quickly. These (Fig. 3) in which a centralized component
services can be created from the ground but are integrates with core systems and then accesses
these integrations as service interfaces.
Figure 3: The ESB bus layout
It provides data model conversions, strong interfaces which is a very time-consuming task
interaction, routing, and even multiple query (even with multiple interfaces), and which will
creation, combining these functions in a single also make future maintenance very difficult. For
service interface that can be repeatedly used by example, ESB can be implemented by using JMS
new applications. Typically, the ESB template is servers and XML/XSD as a means of transferring
implemented with a specially designed integration data between different services. Thus, different
execution environment and tools that are well services will register or connect to these JMS
suited to perform the above functions as servers and exchange data in XML format.
efficiently as possible [11]. Typically, the SOA suite comes with so-called
In principle, SOA can be implemented without adapters that help convert messages to and from a
ESB (Fig. 4), but application owners would have format the service and XML understands.
to find a unique way to provide access to
Figure 4: SOA Comparison with and without ESB
Consider a stock trading system as an example. adapter will convert the FIX message into XML,
Messages from the stock exchange come in using then that xml will be passed to the JSON adapter
the FIX protocol. It’s possible to create an via ESB, which is then converted into JSON as
application that expects JSON. To make both required by your endpoint system. In Fig. 5 is an
systems working, SOA will be used—the FIX example of a JBoss ESB implementation [9].
13
Figure 5: JBoss ESB implementation example
4. ESB Comparative Analysis most often offered on the Kazakhstan market
(Talend [12], Mule [13], WSO2 [14], Red Hat
Below let’s consider how ESB components are Fuse).
implemented and used in the solutions that are
Table 1
ESB comparative analysis
No. ESB / Talend Mule WSO2 Red Hat Fuse
Criteria
1 Studio + + + ±
2 Message JMS 1.1, Microsoft Anypoint MQ, IBM Amazon SQS, Apache
Broker MQ 3.0, JBoss MQ, JMS support, ActiveMQ,
Support Messaging 1.4.4, Apache Kafka, JMS Apache Kafka Apache Kafka,
IBM MQ 8.0, Apache 1.0.2, 1.1, 2.0 support AWS MQ,
ActiveMQ 5.13.2 RabbitMQ, JMS
support
3 Logging statistics on the logging within each Apache Log4j- Apache Log4j-
execution of tasks integration created in based logging based logging via
and components, Mule: errors and via the Apache Apache Commons
errors, warnings and events mandatory for Commons Logging library,
exceptions at the logging by integration Logging library. SLF4J,
task level, data flow logic; logging starting, System and java.util.logging,
within tasks; logging stopping, deploying, component Elastic
in Elastic, Apache and disconnecting events are
Log4j, Apache Mule services and logged
Commons Logging, integrations separately
Trace Logs
4 Monitoring + + + +
14
Developers also add Apache Kafka (plus 9. The logic of routes and conversions is set
Kafka Connect) and RabbitMQ message brokers by the operator: the source of information, the
to the list, but these two solutions are not ESB, and purpose of conversion and the place of
it is not reasonable to consider them within the acceptance.
scope of this analysis. As criteria let’s choose the 10. Logs are saved in the message broker. If
basic functional components of data buses: errors or losses occur, it will be possible to
whether the studio is, Message Broker Support, determine the cause of the failure without having
the way of logging and monitoring. to repeat the incident. Accordingly, errors can be
corrected, and data restored quickly and easily.
5. Features of Modern ESB
6. Practical Implementation of ESB
The data bus is a set of software that acts as a for Effective Integration of SIEM
single hub for the exchange of messages between
information systems and applications. The service in Critical Information
bus allows for easy configuration of message Infrastructure
paths, stores the history of messages, and records
the path of each message. The basic principles of The developed platform [6, 15] applies a
it are below: security event correlation mechanism that allows
1. Any upgrade of an item inevitably requires the platform to be used as a dedicated and fully
a large-scale reworking of the integrations. For functional SIEM system. The platform provides
example, an Oracle database update is released, correlation for normalized logs/events,
and all the integrations related to it have to be searches/queries for threat analysis and sources of
reworked. vulnerability factor information and produces
2. Event logging in each of the integrations is risk-aware alarms. The primary objective is to
implemented differently (if implemented). If data collect as many events as possible from the
is lost or comes in with errors, it will be difficult organization's infrastructure [16].
to trace the time and cause of the error. During the digital transformation, companies
3. Each new element of the system requires a (regardless of their size) use multiple information
significant investment in Point-to-Point systems. Frequently, they operate overlapping
integration. For example, to add new trading data arrays. ESB is designed to integrate different
platforms, it will be necessary to integrate them information systems. The data exchange takes
with an online store, CRM, WMS, ERP, PIM, etc. place via ESB, using various protocols and
4. Business intelligence is becoming more formats, allowing to avoid modifications of the
complex: data is stored in different sources, in systems being integrated. The use of ESB for
different formats, or duplicated. Combining them SIEM-class systems is aimed at the balanced
into a convenient tool for making management distribution of the load on services and security of
decisions is a difficult task. data exchange.
5. As the infrastructure increases, the time and Consider how services can communicate
resources required to maintain it increase directly with each other. To retrieve data from an
accordingly. Also, the reserve of resources to application, it is necessary to go through a
improve its work decreases. complex multi-level chain of operations. There
6. ESB-bus combines a few functions, which can be several to dozens or hundreds of such
a “star” topology distributes across integrations or services. The continuous exchange of messages
not implements. between systems can create a heavy load. On the
7. ESB collects information from other user side, it will lead to long latency times and
systems: either related to the company’s IT constant application failures (Fig. 6). It is also
infrastructure or external. The information is worth noting that if one of the systems needs to be
received in the form and formats in which it is updated, changed, or distributed to other
contained in the source system. departments, this will inevitably affect all other
8. Within the ESB, the data are converted into services.
the required formats for transmitting to other
systems.
15
Figure 6: Interaction of services without a bus
Using ESB for SIEM-class systems The benefits of the solution are as follows: makes
completely changes the organization of processes it easier to integrate applications by implementing
in a company. Namely, applications no longer ESB for SIEM-class systems saves time and
need to communicate directly with each other, resources, improves the functioning of services,
instead, each of them interacts only with the and enhances the organization's efficiency and
integration platform. This instantly eliminates the security.
need for a huge number of accesses methods, as To collect information (events) the system
many interfaces as there are services will be uses its agents installed in monitored subsystems,
needed. If changes need to be made to one of the as well as standard existing mechanisms for
systems, it will not affect the other corporate collecting events (syslog, snmp, etc.). For
applications. The ESB will single-handedly take network control, it can be used as a collector of
on all these tasks (Fig. 7). Thus, this approach, NetFlow statistics received from network
unlike traditional point-to-point architecture equipment. It can also be used to analyze network
(where services interact directly with each other), traffic either by mirroring traffic from network
has more flexibility. Integration scenarios can be equipment or by sending traffic through itself.
modified with minimal developer intervention.
Figure 7: Service interaction with the bus
The system sends events over an encrypted delivery of messages from multiple sources to
channel to the message broker. If there is no multiple recipients. This is an electronic queue
connection to the message broker, it ensures for messages.
temporary storage of data, minimizing the risks of Repository is a special storage of unprocessed
losing critical information. Multiple brokers can records in encrypted form. An important part
be installed in a monitored system. Some for collecting legally relevant evidence for
important concepts: incident investigations.
Message broker should be understood as a Horizontally extensible databases are a
special software which ensures the guaranteed distinctive architectural advantage of the
16
developed platform. The system uses distributed security violation event. This module has an
databases of different types to solve metrics interactive graphical interface.
control (monitoring) and event control (SIEM) The analytics module is comprehensive event
tasks in parallel [17]: analysis software that performs normalization,
High speed of processing large streams of correlation, and event analysis. It also finds
information. dependencies, defines an event as an incident, and
Minimal delays in data processing. informs other systems. Also, it has an interactive
Minimal delays for building analytical reports graphical interface.
and queries. The service-oriented architecture, of which the
High fault tolerance. developed platform is a part, integrates all APIs,
Storage expandability by adding nodes without which ensures end-to-end integration. An API is a
database downtime. so-called set of rules and conditions for programs
A monitoring module is comprehensive to communicate with each other: input and output
software for controlling metrics. Usually, such data, and types of operations. The use of an API
tasks are called “Monitoring” and are real-time significantly simplifies interaction: it ties together
tracking of quantitative metrics of systems. When the capabilities of different services, forming
metrics enter risk zones, the module creates a interfaces that are accessible to different users
(Fig. 8).
Figure 8. SOA service to bus interaction
Microservice architecture differs from the ments specified in this specification (clauses
traditional ESB approach for SIEM-class systems 11.12 in Table 2).
because its functionality is organized into small The customer provides the allocation of
services, each of them is responsible for a separate resources in accordance with the specified
task, is supported by one team, and can work in calculation, installation and basic
isolation from the others. There is no centralized configuration of operating systems (including
base with this approach. Each service has its configuration of the disk subsystem and
repository of information. The ESB for SIEM- network interfaces) for installing SIEM. The
class systems, however, serves only as a transport, Supplier shall provide the Customer with an
being, in essence, just a message broker. operating system distribution (on media or in
Interaction between the user and the platform the form of a download link) and, if necessary,
services is also performed via API [18]. a license for operating systems.
Taking to account [5–7] SIEM data sheet well The customer provides access from servers to
be following (Table 2). the Internet during the installation and
Additional requirements are following: configuration of SIEM.
The Supplier ensures the installation of SIEM For the entire duration of the SIEM operation,
software on physical servers and/or the the customer provides constant access from the
Customer’s virtualization platform. SIEM servers to the licensing server to control
The supplier provides the Customer with a the license.
calculation of the resource requirements for The Supplier, within 10 (ten) calendar days,
installing SIEM. The calculation is made by completes the installation and configuration of the
the Supplier based on the performance require- SIEM system.
17
Table 2
Data sheet information security and event management system
N Name Description
Information security event monitoring system and real-time incident detection (SIEM)
1 Special The IS event monitoring system and real-time incident detection (hereinafter
purpose referred to as SIEM) is designed to monitor and analyze IS events and must:
Carry out centralized collection, storage and processing of events of
system logs (logs), as well as network flows from various systems of the
Customer's infrastructure.
Identify important events and IS incidents in the total mass of data, which
should allow the Customer’s IS specialists (hereinafter referred to as the
Customer's personnel) to concentrate on the most serious incidents and
respond to them in a timely manner.
Inform the Customer’s personnel about identified information security
incidents by sending messages to e-mail.
2 Centralized SIEM should provide centralized management of all its components and
Management functionality through a single graphical Web interface.
3 Data SIEM should:
visualization Allow the creation of graphical panels (dashboards) using any events, with
(Dashboards) automatic updating at a given interval.
Support the creation of new graphical panels or modification of existing
ones using a “wizard,” by method that does not require the use of
programming languages.
Allow the saving of graphical panels for collective use. The graphic panels
of the module must support various types of data presentation: tables,
pie and line charts, etc. The graphic panels of the module should function
automatically, without the need for regular maintenance by the operator.
Display graphical panels via WEB.
Interface.
4 API support SIEM should: have an open software interface API for possibility integration
with other Modules.
5 Support for SIEM should support the following methods to provide user authentication
authentication and authorization:
and Local user base.
authorization Active Directory.
LDAP.
Tokens (for API access).
6 Update The SIEM must support the ability to automatically and/or manually update
as new versions are released.
7 Fault The SIEM database must be able to support a cluster organization in the
Tolerance amount of at least two nodes (node)
8 Scaling SIEM should:
▪ Provide horizontal scaling by adding hardware and, if necessary,
purchasing additional licenses for SIEM in accordance with the current (at
the time of scaling) licensing policy.
▪ Have an event storage component (database) in which the following
functions are implemented:
● Scaling without a fixed limit on the volume of event storage (adding
additional equipment if necessary).
● Fault-tolerant implementation.
18
9 Collecting and SIEM should:
filtering Support standard methods for collecting event logs: Syslog, Raw/Plaintext,
events GELF, CEF, file event logs (using agents for Linux/Windows).
Provide analysis of events in real time.
Provide filtering, as well as display through the user interface of an event
in real time, where the user can immediately apply filters.
Be able to save search criteria for quick access in the future.
Support search by events using the query language (if you use your own
query language, it should be described in the documentation).
Provide the user with the opportunity to independently connect event
sources that are not supported by default or systems of their own design.
Support data transmission from sources to the control system via a secure
channel (if there is support for secure transmission in the protocol).
Support centralized management of agents through the SIEM interface
(for agents of the Beats family).
10 Account SIEM should:
Management Support a role-based management model with a predefined set of roles.
Requirements Be able to create and use User Groups (Teams).
Have a token management system for authorization in the API.
Performance Requirements
11 Events per Average daily—no more than 200 EPS
second requi- Maximum in the busiest hour—no more than 400 EPS
rements (EPS)
12 Requirements The daily amount of information stored in the event database is no more than
for informa- 4 GB per day.
tion stored in The storage period for events in the database and/or SIEM archive is at least
the database 3 years.
7. Conclusions To implement SIEM in a critical information
infrastructure, a SOA-based distributed data bus
The basis of any SOA architecture is the ESB, is required. The platform uses distributed
the main advantages of which are a wide range of databases of different types to solve metrics and
connectors and scalability of the solution; flexible event control tasks in parallel. This increases
data routing; guaranteed delivery of information parameters by an order of magnitude, providing
messages; organization of a secure transmission processing speed of large flows of information;
channel; centralized management; ability to minimal delays for data processing; minimal
monitor and diagnose the state of transmission; delays for analytical reports and queries; high
possibility of integration with third-party message fault tolerance; storage extensibility by simply
queues. adding nodes without database downtime. The use
The analysis of modern ESB solutions has of API significantly simplifies interaction: it ties
shown that each of the products has its features, together the capabilities of different services,
which form the basis of their fields of usage. If a forming interfaces available to different users.
company wants to use free versions of the After concept and DB development, the ESB
product, Fuse would be the most suitable option was justified as well as data sheet for SIEM in
(but it would be necessary to consult developers critical infrastructure was formed and proposed in
for significant revisions). Talend or Mule are good this paper.
options in the early stages of a company's
development. WSO2 has the best balance of 8. Acknowledgment
functionality and ease of calculating the cost of
the license. This work is carried out within the framework
of research grant #АР06851243 “Methods,
19
models and tools for security events and incidents IEEE International Symposium on Service-
management for detecting and preventing cyber- Oriented System Engineering, 2008, pp.
attacks on critical infrastructures of digital 160–165, doi: 10.1109/SOSE.2008.15.
economics” (2020–2022), funded by the Ministry [9] W. Li, Design and Implementation of
of Digital Development, Innovation and Software Testing Platform for SOA-Based
Aerospace Industry of the Republic of System, in IEEE 6th Int. Conf. on Comp. and
Kazakhstan. Commun. Syst., 2021, pp. 1094–1098, doi:
10.1109/icccs52626.2021.9449221.
9. References [10] ESB (Enterprise Service Bus),
https://www.ibm.com/cloud/learn/esb.
[1] V. Grechaninov, et al., Decentralized Access [11] P. Dai, Design and implementation of ESB
Demarcation System Construction in based on SOA in power system, in 4th
Situational Center Network, in Cybersecurity International Conference on Electric Utility
Providing in Information and Deregulation and Restructuring and Power
Telecommunication Systems II, vol. 3188, Technologies (DRPT), 2011, pp. 519–522,
no. 2, 2022, pp. 197–206. doi: 10.1109/drpt.2011.5993946.
[2] V. Grechaninov, et al., Formation of [12] J. Sreemathy, et al., Data Integration in ETL
Dependability and Cyber Protection Model Using TALEND, in 6th International
in Information Systems of Situational Conference on Advanced Computing and
Center, in Emerging Technology Trends on Communication Systems, 2020, pp. 1444–
the Smart Industry and the Internet of Things, 1448, doi: 10.1109/ICACCS48705.2020.
vol. 3149, 2022, pp. 107–117. 9074186.
[3] V. Buriachok, V. Sokolov, P. Skladannyi, [13] X. Mkhwanazi, H. Le, E. Blake, Clustering
Security rating metrics for distributed between Data Mules for Better Message
wireless systems, in 8th International Delivery, in 26th Int. Conf. on Advanced
Conference on “Mathematics. Information Information Networking and Applications
Technologies. Education:” Modern Machine Workshops, 2012, pp. 209–214.
Learning Technologies and Data Science [14] I. Kumara, C. Gamage, Towards Reusing
(MoMLeT and DS), vol. 2386, 2019, pp. ESB Services in Different ESB
222–233. Architectures, in IEEE 34th Annual
[4] A. Skendžić, B. Kovačić, B. Balon, Computer Software and Applications
Management and Monitoring Security Conference Workshops, 2010, pp. 25–30,
Events in a Business Organization—SIEM doi: 10.1109/compsacw.2010.15.
system, in 45th Jubilee International [15] S. Gnatyuk, et al., Cloud-Based Cyber
Convention on Information, Communication Incidents Response System and Software
and Electronic Technology (MIPRO), 2022, Tools, Communications in Computer and
pp. 1203–1208, doi: 10.23919/mipro55190. Information Science, vol. 1486, 2021,
2022.9803428. pp. 169–184.
[5] S. Gnatyuk, et al., Modern SIEM Analysis [16] T. Laue, et al., A SIEM Architecture for
and Critical Requirements Definition in the Multidimensional Anomaly Detection, in
Context of Information Warfare, in CEUR 11th IEEE International Conference on
Workshop Proceedings, 2021, vol. 3188, pp. Intelligent Data Acquisition and Advanced
149–166. Computing Systems: Technology and
[6] R. Berdibayev, et al., A Concept of the Applications (IDAACS), 2021, pp. 136–142,
Architecture and Creation for SIEM System doi: 10.1109/IDAACS53288.2021.9660903.
in Critical Infrastructure, Studies in Systems, [17] P. Asef, et al., SIEMS: A Secure Intelligent
Decision and Control, vol. 346, 2021, Energy Management System for Industrial
pp. 221–242. IoT applications, in IEEE Transactions on
[7] S. Gnatyuk, et al., Modern Types of Industrial Informatics, doi: 10.1109/tii.2022.
Databases for SIEM System Development, 3165890.
CEUR Workshop Proceedings, vol. 3187, [18] M. Orsós, et al., Log Collection and SIEM
2021, pp. 127–138. for 5G SOC, in IEEE 20th Jubilee World
[8] Z. Jin, H. Zhu, A Framework for Agent- Symposium on Applied Machine Intelligen-
Based Service-Oriented Modelling, 2008 ce and Informatics (SAMI), 2022, pp. 147–
152, doi: 10.1109/sami54271.2022.9780759.
20