The Future of SIEM in a Machine Learning-Driven Cybersecurity Landscape
Main Article Content
Abstract
As cyber threats become increasingly sophisticatedand complex, traditional Security Information and Event Management (SIEM) systems are struggling to keep up. The integration of artificial intelligence (AI) and machine learning (ML) into SIEM tools is transforming the way organizations detect, investigate, and respond to security incidents. This paper explores the future of SIEM tools in the context of the evolving cybersecurity landscape and discusses how organizations can prepare for the adoption of ML-enabled SIEM systems.ML-enabled SIEM systems significantly enhance the capabilities of traditional SIEM tools,enabling them to more effectively detect and respond to both known andemergingthreats.Organizations must develop a robust data strategy,invest in talent,and adopt ML-enabled SIEM solutions gradually to fully take advantage ofthepotentialof these technologies.Staying up-to-date with the latest trends in ML and cybersecurity isalsocrucial for organizations to maximize the benefits of ML-enabled SIEM tools.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Microsoft,“Microsoft report shows increasing sophistication of cyber threats,” September 2020.Available online:https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/
LaurenB. (AT&T), “Top 5 Problems with Traditional SIEM,” April 2014. Available online:https://cybersecurity.att.com/blogs/security-essentials/top-5-problems-with-traditional-siem-infographic
Karen S., “SIEM tools, future tech and how to prepare for what's ahead,” October 2018.
Available online:https://www.techtarget.com/searchsecurity/tip/Give-your-SIEM-system-a-power-boost-with-machine-learning
Joe G., “Why a firewall is not enough,” February 2019. Available online:https://blog.corserva.com/why-siem-if-already-have-a-firewall
Gartner, “Hype Cycle for Security Operations, 2020,” June 2020. Available online:https://www.gartner.com/en/documents/3986721
Petra W., “Security Think Tank: SIEM and AI–a match made in heaven?” July 2020. Available
online:https://www.computerweekly.com/opinion/Security-Think-Tank-SIEM-and-AI-a-match-made-in-heaven
Dave S., “How cloud-based SIEM tools benefit SOC teams,” December 2020. Available online:https://www.techtarget.com/searchsecurity/tip/How-cloud-based-SIEM-tools-benefit-SOC-teams
Hassan, WajihU.,Guo, ShengjianL., Ding,C., ZhengzhangJ., KangkookL., ZhichunB., Adam,“NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage,” February 2019.
Available online:https://par.nsf.gov/biblio/10085663
Joan T., “AI for Enhanced Healthcare Security: An Investigation of Anomaly Detection,Predictive Analytics, Access Control, Threat Intelligence, and Incident Response,” 2017. Available
online:https://research.tensorgate.org/index.php/JAAHM/article/view/16
Logsign, “What is Behaviour Anomaly Detection?” August 2019. Available online:https://www.logsign.com/blog/what-is-behaviour-anomaly-detection/
IBM, “What is SIEM.” Available online:https://www.ibm.com/topics/siem
Splunk, “Install and use the Splunk AIAssistant.” Available online:https://docs.splunk.com/Documentation/AIAssistant/0.2.5/User/AboutAIAssistant
Karen S., “Prepping your SIEM architecture forthe future,” October 2018. Available online:https://www.techtarget.com/searchsecurity/tip/Prepping-your-SIEM-architecture-for-the-future
Graham S., “The intelligent solution: automation, the skills shortage and cyber-security,”August 2018. Available online:
https://www.sciencedirect.com/science/article/abs/pii/S1361372318300733
Alexandra, “SIEM: A Guide to Successful Implementation, Strategy, and Planning,” July2017. Available online:https://stackify.com/siem-implementation-strategy-and-plan/