2019-345
2019-345
Automation of Security Information and Event Management
Automation of Security Information and Event ManagementKYLE M. BUTERA, QUINN P. MCHUGH, ZACHARY S. MILES, DYLAN A. CHOW, KEVIN M. MALONE, DAVID
A. SERRANO, DANIEL VEGA, JACOB R. DOMINGUEZ, ROSTYSLAV S. HNATYSHYN, ALEX LAM, and ERIC
A. CURRIE
Cybersecurity awareness is extremely critical in today’s climate. Many mission-critical systems require real-time and actionable data analytics, event monitoring and response. While existing cybersecurity tools are available, they are often riddled with deficiencies that make them difficult to utilize effectively. One such tool, SPLUNK, has many challenges. While very powerful, it lacks user-friendly representation of data, algorithmic filtering mechanisms, and the ability to prioritize events by criticality. Our research for our comprehensive solution examined in detail both compliance standards from the Federal Information Systems Management Act (FISMA) of 2002, the National Institute of Standards (NIST) SP 800-53 Security Controls and the underlying functionality of SPLUNK itself. We developed a cloud-based application to merge existing security capabilities with a novel security framework.
College of Science & Mathematics
Main Menu
- Computer Science
- Academic Programs
- BS Computer Science
- BA Computing & Informatics
- BA Computer Systems Technology
- MS Computer Science
- MS Cybersecurity
- MS Data Science
- PhD Data Science
- Minor in Computer Science
- Minor in Data Science
- Accelerated Dual Degree Program
- Certificates of Undergraduate Study
- Certificates of Graduate Study
- Concentrations BS CS
- Concentrations BA C&I
- Cybersecurity
- Data Science
- Compare University Computing Programs
- Compare our Undergraduate Programs
- Advising Materials
- Undergraduate
- BS Computer Science
- BA Computing & Informatics
- BA Computer Systems Technology
- Certificate of Undergraduate Studies
- Computer Programming
- Mobile Apps CUGS
- Fundamental Computing CUGS
- Cybersecurity
- Blockchain Technologies and Cryptocurrencies
- Advanced Network Technology
- Azure Fundamentals
- Cybersecurity in Information Technology
- Database Development
- Database Fundamentals
- Digital Forensics
- Ethical Hacking
- Internet of Things
- Intrusion Detection/Prevention
- Linux Systems Administration
- Network Fundamentals
- Operating Systems Fundamentals
- Minor Degrees
- CS Undergraduate Catalog
- Graduate
- "4+1" (ADDP)
- Program Guides
- BS Computer Science
- BS Data Science
- Minor in Computer Science
- Concentrations
- CUGS Guides
- Advanced Network Technology
- Azure Fundamentals
- Blockchain Technologies & Cryptocurrencies
- Computer Programming
- Cybersecurity
- Cybersecurity in Information Technology
- Database Development
- Database Fundamentals
- Digital Forensics
- Ethical Hacking
- Fundamental Computing
- Internet of Things
- Intrusion Detection/Prevention
- Linux Systems Administration
- Mobile Application Development
- Network Fundamentals
- Operating Systems Funamentals
- 4+1 Programs
- MS Computer Science
- MS Cybersecurity
- COGS Guides
- MS Data Science
- Standard Course Syllabi
- Forms & Policies
- Undergraduate
- Faculty and Staff
- Students
- Research
- News
- Events
- Contacts
- Faculty Portal - secured
- Site Index
- Can't find it?
- Computer Science