Setting up and Fine Tuning a Security Operations Centre

作者: Vasileios Friligkos

DOI:

关键词:

摘要: Given the need for every company to be cost-effective, it comes as no wonder that Management does not wish allocate many resources information security while on same time demands a perfect and exhaustive coverage of its infrastructure applications. This paper will deal with possible ways maximize efficiency Security Operations Center (SOC), a specialized team responsible centralize manage totality operations regarding an IT infrastructure, in order protect proactively respond, real time, events. Using fully operational network base experiments, multiple real life attack scenarios were reproduced study results, adapt defensive mechanisms using acquired feedback present gained experience. These results can used an exhaustive guideline anyone interested setting up efficiently Center. Through best practices proposed by paper, analyst will able fine tune SOC specific context organization question, making sure that critical elements are overseen or forgotten. Moreover, this paper give answers about how provide to the upper-management layers an service minimize risks and mitigate events being cost-effective efficient. Detailed descriptions the necessary tools centralization, monitoring resolution well how should they configured fine tuned also included. Even though description all procedures is exhaustive, through conducted experiments was made clear have efficient SOC, which translates constant, realistic reacting protection continuous systematic procedure needs implemented update, tune techniques employed depending evolution demands, needs, kind of changes associated question. Therefore, there plug play solutions that deployed then forgotten, matter cost. Human expertise always required and plays crucial role whole procedure protecting infrastructure.

参考文章(7)
Felix C. Freiling, Konrad Rieck, Christian Gorecki, Thorsten Holz, Measuring and Detecting Fast-Flux Service Networks network and distributed system security symposium. ,(2008)
Farnam Jahanian, Danny McPherson, Evan Cooke, The Zombie roundup: understanding, detecting, and disrupting botnets conference on steps to reducing unwanted traffic on internet. pp. 6- 6 ,(2005)
Thomas E. Bernhard, Steven D. Shanklin, Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators ,(1999)
Cliff Joslyn, Sutanay Choudhury, David Haglin, Bill Howe, Bill Nickless, Bryan Olsen, None, Massive scale cyber traffic analysis: a driver for graph database research First International Workshop on Graph Data Management Experiences and Systems. pp. 3- ,(2013) , 10.1145/2484425.2484428
Colin Tankard, Advanced Persistent threats and how to monitor and deter them Network Security. ,vol. 2011, pp. 16- 19 ,(2011) , 10.1016/S1353-4858(11)70086-1
Jelena Mirkovic, Internet denial of service : attack and defense mechanisms Prentice Hall Professional Technical Reference. ,(2005)