• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem

    Systematic review of SIEM technology: SIEM-SC birth

    Autor: 
    López Velásquez, Juan Miguel
    ;
    Martínez Monterrubio, Sergio Mauricio
    ;
    Sánchez Crespo, Luis Enrique
    ;
    Garcia Rosado, David
    Fecha: 
    2023
    Palabra clave: 
    GDPR; information security compliance; privacy laws; security events; security information; SIEM; Scopus; JCR
    Tipo de Ítem: 
    Articulo Revista Indexada
    URI: 
    https://reunir.unir.net/handle/123456789/15464
    DOI: 
    https://doi.org/10.1007/s10207-022-00657-9
    Dirección web: 
    https://link.springer.com/article/10.1007/s10207-022-00657-9
    Resumen:
    This paper contains a systematic review carried out to address the current status of the System Information and Event Management (SIEM) technology and what may possibly be the next steps in the future. We shall focus on: where SIEM will shift in the near/long-term future, whether this change will affect the technology as it is right now, and finally, what benefits users will obtain from this growing security-monitoring technology. The paradigm of this technology is slowly shifting from monitoring/alerting to demanding international standards with which all security tools must comply in every internal or external audit, leaning toward security-as-a-service rather than premise solutions and improvements to detection engines in order to make them respond faster and in a more agile and accurate manner, thus optimizing analyst time. All of this had been taken into account by comparing, analyzing, correcting, and predicting the near future of this technology, highlighting its usage together with the compatibility of cutting edge technology such as Blockchain, containers, cloud, international compliance. Of the papers analyzed, 50% were new proposals at the time of their publication, impacting on SIEM functionality, and 19% were involved in real scenarios. The authors use the papers analyzed as the basis on which to propose a new framework that is compatible with GDPR, using multiple technologies blockchain, encryption, and containers. This framework has been denominated as SIEM-SC (Security Compliance).
    Mostrar el registro completo del ítem
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Artículos Científicos WOS y SCOPUS

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    28
    232
    230
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • Coronavirus fake news detection via MedOSINT check in health care official bulletins with CBR explanation: The way to find the real information source through OSINT, the verifier tool for official journals 

      Martinez Monterrubio, Sergio Mauricio ; Noain-Sánchez, Amaya ; Verdú, Elena ; González-Crespo, Rubén (Elsevier Inc., 2021)
      This research aims to design and prototype a tool to perform intelligence on open sources (OSINT), specifically on official medical bulletins for the detection of false news. MedOSINT is a modular tool that can be adapted ...
    • STEG-XAI: explainable steganalysis in images using neural networks 

      Kuchumova, Eugenia; Martínez-Monterrubio, Sergio Mauricio; Recio-Garcia, Juan A. (Multimedia Tools and Applications, 2024)
      Multimedia content’s development and technological evolution have enhanced and even facilitated the application of steganography as a means to introduce hidden messages for cybercrime-related purposes. Artificial intelligence ...
    • Methodology for Computer Security Incident Response Teams into IoT Strategy 

      Enciso Bernal, Alejandro ; Martinez Monterrubio, Sergio Mauricio ; Parra Puente, Javier ; González-Crespo, Rubén ; Verdú, Elena (KSII transactions on internet and information systems, 2021)
      At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioContacto: reunir@unir.net

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja