Back to Search Start Over

Secure Mechanism Applied to Big Data for IIoT by Using Security Event and Information Management System (SIEM).

Authors :
Hussein, Marwan Alaa
Hamza, Ekhlas Kadhum
Source :
International Journal of Intelligent Engineering & Systems; 2022, Vol. 15 Issue 6, p667-681, 15p
Publication Year :
2022

Abstract

It is estimated that the number of devices and sensors connected to the Internet of Things (Internet of Things) will grow to around 125 billion by the end of this decade, compared to 21 billion this year. The Internet of Things promises tremendous advantages in many applications such as industrial environment, smart homes, smart cities, smart environment, agriculture, control of critical infrastructure and smart health. However, as the number of IoT devices increases and more information is shared between IoT devices, massive amount of data is transmitted between these devices and providing security becomes a major concern for researchers, developers and users, since IoT devices have low power and limited computing and storage capabilities. Where the application of strong and complex encryption processes requires significant capabilities in terms of computing and storage, which makes these devices more vulnerable to attacks and security risks that threaten the integrity of corporate and institutional data and other information. This article proposes implementing a security solution based on the "all-in-one" architecture for Wazuh and Elastic Stack as a tester, in order to implement proof of concept to detect anomalies occurring in devices on a network, which constitute the Wazuh proxy. In this way, the security contribution proactively with the collection of logs in real time, allows this system in question to generate alerts in the event of attempted attacks and implement the active response, a measure that allows mitigation of the detected incident. This project promotes open-source software solutions, and proves to be a complete business security solution in the context of analysing log data to secure a host for the internal business network. He concluded that the solution is ideal for business environments of any type, and even more so for small environments such as our simulated environments. Considering that the method of automating responses to security incidents offers a great alternative in the field of information technology. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
2185310X
Volume :
15
Issue :
6
Database :
Complementary Index
Journal :
International Journal of Intelligent Engineering & Systems
Publication Type :
Academic Journal
Accession number :
159875122
Full Text :
https://doi.org/10.22266/ijies2022.1231.59