Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Rohitkumar Jha, Donald Laishram, Nishma Kamat, Om Panchal , Prof. Salabha Jacob
DOI Link: https://doi.org/10.22214/ijraset.2024.61367
Certificate: View Certificate
In an increasingly interconnected and digital world, the need for robust cybersecurity measures is paramount. Cyberattacks can therefore occur upon any device at any moment of time in order to steal the sensitive information of the user or can result in identity theft and cyberbullying. There are varieties of attacks that may occur without the user being aware about the same that their computer has been attacked and the hacker has overall access of their data. Also, a user cannot sit in front of their device throughout their life to monitor and protect any type of cyberattack. Therefore, in order to solve the following problems and to enhance the overall security and accuracy of safeguarding the device and its data, we implement our project Security Information and Environment Management (SIEM) system within the Microsoft Azure cloud ecosystem. SIEM plays a critical role in monitoring, detecting, and responding to security threats, making it a crucial component of any organization\'s cybersecurity strategy. To view the notification of the attack for a user and all its details, we therefore connect the SIEM implementations and logs over Microsoft Azure platform, and generate the same with the help of a command-shell Windows PowerShell.
I. INTRODUCTION
A. Introduction To SIEM
SIEM stands for Security Information and Event Management. It is a software solution that aggregates and analyses activity from many different resources across your entire IT infrastructure. SIEM collects security data from network devices, servers, domain controllers, and more. SIEM helps organizations detect, analyse, and respond to security threats before they harm business operations. SIEM combines both security information management (SIM) and security event management (SEM) into one security management system. SIEM technology collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action. SIEM systems vary in their capabilities but generally offer these core functions: log management, event correlation, and incident monitoring and response. SIEM tools use predetermined rules to help security teams define threats and generate alerts. SIEM tools offer many benefits that can help strengthen an organization’s overall security posture, including a central view of potential threats, real-time threat identification and response, advanced threat intelligence, regulatory compliance auditing and reporting, and greater transparency monitoring users, applications, and devices.
SIEM solutions typically consist of some major components for their functioning such as:
B. Introduction To Microsoft Azure
Microsoft Azure is a cloud computing platform that provides a wide range of services and resources to help businesses meet their goals. It is similar to other cloud platforms like Google Cloud and Amazon Web Services (AWS). Azure offers virtual machines, fast data processing, analytical and monitoring tools, and more to make work simpler. It is cost-effective and offers a subscription-based model that allows users to pay only for what they use. Azure has a low operational cost because it runs on its servers whose only job is to make the cloud functional and bug-free. It is easy to implement business models in Azure with a couple of on-click activities 1. Azure also provides easy backup and recovery options, which can save time and avoid large up-front investments.
Following are some of the services Microsoft Azure offers:
C. Introduction To Windows Powershell
Windows PowerShell is a task automation and configuration management program from Microsoft. It is a modern command shell that includes the best features of other popular shells. PowerShell is a cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework. It runs on Windows, Linux, and macOS. PowerShell is designed to help you automate and quickly solve tedious administration tasks. You can use PowerShell to display all the USB devices installed on one or multiple computers in a network, or you can set a time-consuming task to run in the background while you do other work. PowerShell accepts and returns .NET objects, which makes it different from most shells that only accept and return text. PowerShell offers many advantages, including an extensible format system, built-in data formats, an extended type system, secure scripting engine, self-service development, consistent API, easy automation, and more. PowerShell is easy to install on Windows using Winget, MSI package, ZIP package, .NET Global tool, or Microsoft Store package.
II. METHODOLOGY
To implement a comprehensive security solution within Azure, several steps need to be taken, beginning with the configuration of Azure itself. This involves setting up the necessary Azure resources and services to support the security infrastructure. Once Azure is configured, the next step is to configure the required resources within the Azure environment. This includes provisioning virtual machines (VMs), storage accounts, and networking resources as needed to support the security solution.
One critical aspect of the security setup is the configuration of VMware under Azure. This entails deploying VMware virtual machines within the Azure environment and configuring them to meet the organization's security requirements. Additionally, setting up login credentials for these VMs is essential to ensure secure access and prevent unauthorized entry. This involves implementing strong password policies and multi-factor authentication where applicable.
To bolster defenses against potential threats, the project involves implementing a Brute-Force attack prevention mechanism on the VMs. This includes configuring security settings to limit login attempts and implementing measures to block or throttle repeated login attempts from suspicious sources. Furthermore, configuring Windows Powershell ISE within the VM allows for scripting and automation, enhancing security operations and response capabilities.
A crucial aspect of the project is the coding of Windows Powershell ISE scripts for generating logs of attackers' activities. These scripts are designed to capture relevant information, such as IP addresses, login attempts, and other parameters, to aid in threat detection and analysis. Additionally, disabling firewalls on the VMs allows for the logging of attacks from universal sources, providing valuable insight into potential threats.
To enhance threat detection capabilities further, an API key is generated for Windows Powershell ISE, enabling the detection of attacker details and facilitating integration with other security tools and services. Additionally, the project involves coding and setting up a fake log detection mechanism to identify and eliminate false login attempts, improving the accuracy of threat detection.
In addition to traditional threat detection methods, the project includes the coding and setup of a Convolutional Neural Network (CNN) classifier to detect trojan attacks from log data. This advanced machine learning technique enhances the organization's ability to identify and mitigate sophisticated threats.
To streamline the analysis of security logs, log files are generated over the VMs and used to train a Log Analytical Workspace. This involves shaping the logs into an appropriate format using tools such as custom logs and custom fields. The Log Analytical Workspace is then connected to Microsoft Sentinel, allowing for centralized log management and analysis.
Configuration of Microsoft Sentinel includes setting up geolocation data representation for enhanced visualization of attack data. This enables security analysts to better understand the geographic origins of attacks and prioritize response efforts accordingly. Finally, public live attack detection over geolocation representation provides real-time visibility into ongoing security threats, allowing for rapid response and mitigation.
III. FLOWCHART
IV. RESULTS
The implementation of SIEM in Azure using Microsoft Azure and setting up geolocation using Microsoft Sentinel yielded significant results in bolstering the organization's cybersecurity capabilities.
Firstly, the successful deployment of Azure Sentinel within the Azure environment provided a centralized platform for collecting, analyzing, and responding to security events and alerts from various Azure services and data sources. This comprehensive security monitoring enabled proactive threat detection and response, enhancing the organization's ability to identify and mitigate security threats in real-time.
Secondly, the setup of geolocation using Microsoft Sentinel allowed for the visualization and analysis of attack data based on geographic location. This provided valuable insights into the origin of security threats, enabling targeted response strategies and prioritization of response efforts based on the geographic location of security incidents.
Additionally, the project demonstrated successful integration with the Microsoft ecosystem, including Azure services, Microsoft Threat Intelligence, and Azure Security Center. This integration enhanced the effectiveness of threat detection and response by providing access to up-to-date threat intelligence data and enabling seamless collaboration between security tools and services.
Overall, the implementation of SIEM in Azure using Microsoft Azure and setting up geolocation using Microsoft Sentinel significantly strengthened the organization's security posture in the Azure environment, ensuring the integrity and security of its Azure-based assets and services.
Here are some sample shots of the output from Microsoft Sentinel and Geolocation data from the attacker’s log when we made our virtual box public over the public IP:
Connecting attack logs to Microsoft Sentinel
V. ADVANTAGES
VI. DISADVANTAGES
VII. USE CASES
Security Information and Event Management can be applied to various use cases across different industries. Here are some sectors where this model can be used:
VIII. FUTURE SCOPE
The implementation of a SIEM system in Microsoft Azure is a critical step in fortifying an organization's security posture. As technology and cybersecurity landscapes evolve, the project's future scope expands to address emerging trends and challenges.
Here are some areas of potential future development and focus for organizations that have implemented or plan to implement SIEM in Microsoft Azure:
IX. LITERATURE SURVEY
NAME OF PAPER | AUTHOR | YEAR OF PUBLISH |
METHODOLOGY |
CONCLUSION |
Integrated Security Information and Event Management (SIEM) with Intrusion Detection System (IDS) for Live Analysis based on Machine Learning
AUTHOR: Adabi Raihan Muhammad, Parman Sukarno, Aulia Arif Wardana
YEAR OF PUBLICATION: 2022 |
This section investigates the difference between the proposed model and system in this research and another related research. Cakmakci et al. proposed SIEM to detect DDoS attacks on the network. This research uses ontologies methods to detect, recover, and respond to DDoS attacks. This research combines three security tools like firewalls, antivirus, and IDS/IPS to integrate with SIEM. This research used signature-based detection to detect DDoS attacks. This research is prepared to be implemented for IT organizations or industrial ready. Azodi et al. more focus on processing the log for integrate IDS and SIEM. This research also employs a signature-based method to analyze the traffic. |
Based on some previous research, it states that there is no integrated SIEM and IDS with anomaly detection method in live analysis mode. Live analysis mode in anomaly detection method means that machine learning detection and network monitoring need to perform in real-time. The SIEM also gives telegram and email alerts to the IT team when cyberattack alarm detection occurs. The system in this research is also built using opensource software and suitable for industrial applications, especially for SME because opensource software is low cost. |
Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
AUTHOR: Gustavo Gonzalez Granadillo, Atos S.A., Susana González-Zarzosa, Rodrigo Diaz
YEAR OF PUBLICATION: 2021 |
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have evolved to become comprehensive systems that provide a wide visibility to identify areas of high risks and proactively focus on mitigation strategies aiming at reducing costs and time for incident response. |
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have evolved to become comprehensive systems that provide a wide visibility to identify areas of high risks and proactively focus on mitigation strategies aiming at reducing costs and time for incident response. Currently, SIEM systems and related solutions are slowly converging with big data analytics tools. We survey the most widely used SIEMs regarding their critical functionality and provide an analysis of external factors affecting the SIEM landscape in mid and long-term. A list of potential enhancements for the next generation of SIEMs is provided as part of the review of existing solutions as well as an analysis on their bene?ts and usage in critical infrastructures |
SIEM (security information and event management solutions) implementations in private or public clouds
AUTHOR: Vlad-Mihai Cotenescu
YEAR OF PUBLICATION: 2017 |
The paper discusses the historical offerings of SIEM, including SEM and SIM, and how integrated SIEM platforms now provide real-time monitoring of network and security devices. It highlights the challenges faced by end users in implementing SIEM, with perceptions of complexity and slow implementation without sufficient customer value. The paper contrasts SIEM with Log Management solutions, which are perceived more positively for their ability to aggregate, parse, and index logs effectively |
SIEM solutions have evolved to centralize security data management and provide real-time monitoring of security alerts. The paper discusses the challenges faced by end users in implementing SIEM, highlighting perceptions of complexity and slow implementation without sufficient customer value. Today’s security threats are dynamic in nature and exploits are constantly evolving. Attackers grow more organized, precise and persistent and have access to various automated tools that can trigger very sophisticated attacks. As threats and security events evolve, SIEM vendors and the information security community must work together to build relevant and actionable model into their systems.Contrasting SIEM with Log Management solutions, the latter are perceived more positively for their effective aggregation, parsing, and indexing of logs. |
The implementation of a Security Information and Environment Management (SIEM) system in the Microsoft Azure environment represents a significant step forward in enhancing an organization\'s cybersecurity posture. This project, which focused on the integration and deployment of a SIEM solution within the Azure cloud ecosystem, has provided valuable insights and practical knowledge for IT professionals and organizations seeking to bolster their security measures. In this concluding section, we recap the key takeaways and the importance of this project. SIEM can increase its ability to identify threats by determining whether the state of the present gathered data is a threat or not employing a neural network model that generates threat classifications or normalcy by inferring patterns from long-term data collected. And using such a method will significantly improve the SIEM\'s long-term data collection\'s analysis of intelligent cyber threats. In conclusion, integrating Security Information and Event Management with a cloud platform using PowerShell provides a powerful solution for bolstering an organization\'s security defenses. By harnessing the cloud\'s agility and PowerShell\'s automation capabilities, businesses can achieve the following: 1) Agile Deployment 2) Cost Efficiency 3) Compliance Management 4) Global visibility 5) Real Time monitoring 6) Automated Responses
[1] Alom, M. Z., Taha, T. M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M. S., ... & Asari, V. K. (2019). A state-of-the-art survey on deep learning theory and architectures. Electronics, 8(3), 292. (For understanding deep learning architectures for threat detection, relevant to the project\'s CNN classifier implementation.) [2] Microsoft. (n.d.). Azure Sentinel documentation. Retrieved from https://docs.microsoft.com/en-us/azure/sentinel/ (Official documentation for Azure Sentinel, providing technical guidance and best practices for implementing SIEM in Azure.) [3] Gartner. (2021). Gartner Magic Quadrant for Security Information and Event Management. Retrieved from https://www.gartner.com/en/documents/3989645 (For insights into the SIEM market landscape, including evaluations of vendors such as Microsoft Azure Sentinel.) [4] Bhat, A., & Kapoor, R. (2020). An analytical study of geolocation-based intrusion detection techniques. International Journal of Computer Applications, 175(2), 29-34. (Provides insights into geolocation-based intrusion detection techniques, relevant to the project\'s geolocation setup.) [5] Microsoft. (n.d.). Azure Architecture Center - Security. Retrieved from https://docs.microsoft.com/en-us/azure/architecture/browse/?product=security (Offers architectural guidance and best practices for implementing security solutions in Azure, including SIEM deployment.) [6] Ficco, M., Esposito, C., Palmieri, F., Castiglione, A., & Verde, N. (2016). An adaptive network-based security framework for the detection of cyber activities. IEEE Transactions on Industrial Informatics, 12(5), 1891-1900. (Discusses adaptive network-based security frameworks, relevant to the project\'s implementation of security monitoring.) [7] Jones, B., & Barker, A. (2019). Learn Microsoft Azure: Build, manage, and scale cloud applications using the powerful features of Azure. Packt Publishing Ltd. (Provides comprehensive guidance on using Microsoft Azure, including topics relevant to setting up and configuring Azure services for the project.)
Copyright © 2024 Rohitkumar Jha, Donald Laishram, Nishma Kamat, Om Panchal , Prof. Salabha Jacob. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET61367
Publish Date : 2024-04-30
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here