SIEM II
Author: Prof Bill Buchanan
IncidentResponse
SIEM II
Proxy
VPN
Eve
Bob
Alice
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Data Sources/Timeline
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IncidentsIntroduction
Author: Prof Bill Buchanan
Incidents
During IncidentBefore Incident After Incident
Intruder
Intrusion Detection
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
DatastatesInc.Response
Data in-motion, data in-use and data at-rest
Intrusion
Detection
System
Intrusion
Detection
System
Firewall
Internet
Switch
Router
Proxy
server
Email
server
Web
server
DMZ
FTP
server
Firewall
Domain name
server
Database
server
Bob
Alice
Eve
Data in-
motion
Data at-
rest
Data in-
use Data at-
rest
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IncidentsIntroduction
Author: Prof Bill Buchanan
Incidents
During IncidentBefore Incident After Incident
Timeline
Data At Rest
Data In-Motion
Data In-Process
Files, Directories, File Rights,
Domain Rights, etc.
File changes, File CRUD
(Create, Delete, Update,
Delete), Thumbprints
Network packet logs, Web
logs, Security logs
Network scanners, Intrusion
Detection Systems, Firewall
logs, etc
Processes, Threads, Memory,
etc.
Security Log, Application Log,
Registry, Domain Rights.
Intruder
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Four Vs of Big Data
Intrusion
Detection
System
Firewall
Router
Proxy
server
Email
server
Web
server
FTP
server
Switch
Alice
Management report
Sales analysis
Targeted marketing
Trending/Correlation
V- Volume
[Scale of data]
V- Variety
[Different forms of
data]
V- Velocity
[Speed of data generation]
V- Veracity
[Trustworthiness]
Incident Response
Eve
Bob
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Data Capture
Web
server
IT Ops
Nagios.
NetApp.
Cisco UCS.
Apache.
IIS.
Web Services
Firewall
Router
Proxy
server
Email
server
FTP
server
Switch
Eve
Bob
Microsoft
Infrastructure
Active Directory.
Exchange.
SharePoint.
Structured Data
CSV.
JSON.
XML.
Database Sys
Oracle.
My SQL.
Microsoft SQL.
Network/Security
Syslog/SNMP.
Cisco NetFlow.
Snort.
Intrusion
Detection
System
Alice
Cloud
AWS Cloudtrail.
Amazon S3.
Azure.
Application Serv
Weblogic.
WebSphere.
Tomcat
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Investigation sources
Web
server
Firewall
Router
Proxy
server
Email
server
FTP
server
Bob
Eve
Internal systems
Cloud service providers
Communication service
providers
Trusted partners
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Eve
Eve
Logs/alerts
Bob
SIEM Package (Splunk)
News feeds
Security alerts
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Threat Analysis
Proxy
VPN
Eve
Bob
Alice
SIEMNetworkSecurity
SIEM
Data Fusion
Semi-structured
>10 million events
Select shape and type
text. Yellow handle
adjusts line spacing.
Data storage (2GB/day)
Context
Parsing/
Normalisation
Processing
Rule based correlation.
Statistical correlation.
Event priorization
SIEM
10,000 alerts
1 incident
Aggregation
SIEMNetworkSecurity
SIEM
Security Operations Centres (SoC)
SIEMNetworkSecurity
SIEM
Logstalgia
SIEMNetworkSecurity
SIEM
Honeynet
SIEMNetworkSecurity
SIEM
Akamai.com
SIEMNetworkSecurity
SIEM
Trent Micro Threat Analysis
SIEMNetworkSecurity
SIEM
DDoS Attack Map
SIEMNetworkSecurity
SIEM
State of the Internet
SIEMNetworkSecurity
SIEM
IPew Attack Map
SIEMNetworkSecurity
SIEM
FORINET
SIEMNetworkSecurity
SIEM
NORSE
SIEMNetworkSecurity
SIEM
Kaspersky Cyber Threat Map
SIEM II
Author: Prof Bill Buchanan
IncidentResponse
SIEM II
Proxy
VPN
Eve
Bob
Alice

More Related Content

PPTX
Incident response: Introduction
PDF
Using Big Data to Create Engagement Agility
PDF
Venturefest 2016 Cyber Security Innovation
PPT
Incident Response: Network Forensics
PPTX
Incident Response: Tunnelling
PPTX
SIMD 2016 - Alistair McAlpine
PPTX
Big Data Big Picture - Professor Derek Bell
PDF
CSN09112: Introduction to Computer Security
Incident response: Introduction
Using Big Data to Create Engagement Agility
Venturefest 2016 Cyber Security Innovation
Incident Response: Network Forensics
Incident Response: Tunnelling
SIMD 2016 - Alistair McAlpine
Big Data Big Picture - Professor Derek Bell
CSN09112: Introduction to Computer Security

Viewers also liked (15)

PDF
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
PPTX
e-Frality - Adrian Smales and Brian Brown (CM2000)
PPTX
Trust and Governance in Health and Social Care
PPTX
Blockchain and Health - James Little-john
PPTX
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
PPTX
Incident Response: SIEM
PPTX
Population Health Management - Angus McCann
PPTX
LIquidity and Validity - Jan Gill
PPTX
Machine Learning for Threat Detection
PDF
National Cybersecurity - Roadmap and Action Plan
PDF
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
PPTX
When Cyber Security Meets Machine Learning
PDF
Artificial Intelligence and Machine Learning for Cybersecurity
PPTX
Incident response: Advanced Network Forensics
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
e-Frality - Adrian Smales and Brian Brown (CM2000)
Trust and Governance in Health and Social Care
Blockchain and Health - James Little-john
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Incident Response: SIEM
Population Health Management - Angus McCann
LIquidity and Validity - Jan Gill
Machine Learning for Threat Detection
National Cybersecurity - Roadmap and Action Plan
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
When Cyber Security Meets Machine Learning
Artificial Intelligence and Machine Learning for Cybersecurity
Incident response: Advanced Network Forensics
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Ad

More from Napier University (20)

PDF
Intrusion Detection Systems
PPTX
PPTX
Memory, Big Data and SIEM
PPTX
What is Cyber Data?
PPTX
Open Source Intelligence
PDF
10. Data to Information: NumPy and Pandas
PDF
2. Defence Systems
PDF
1. Cyber and Intelligence
PPTX
The Road Ahead for Ripple, Marjan Delatinne
PDF
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
PPTX
ARTiFACTS, Emma Boswood
PPTX
RMIT Blockchain Innovation Hub, Chris Berg
PPTX
Keynote, Naseem Naqvi
PPT
Browser-based Crypto M, C. F Mondschein
PPTX
Should we transform or adapt to blockchain - a public sector perspective?, Al...
PPTX
IoT device attestation system using blockchain, Alistair Duke
PPTX
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
PDF
Using Blockchain for Evidence Purpose, Rafael Prabucki
PPTX
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
PPTX
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Intrusion Detection Systems
Memory, Big Data and SIEM
What is Cyber Data?
Open Source Intelligence
10. Data to Information: NumPy and Pandas
2. Defence Systems
1. Cyber and Intelligence
The Road Ahead for Ripple, Marjan Delatinne
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
ARTiFACTS, Emma Boswood
RMIT Blockchain Innovation Hub, Chris Berg
Keynote, Naseem Naqvi
Browser-based Crypto M, C. F Mondschein
Should we transform or adapt to blockchain - a public sector perspective?, Al...
IoT device attestation system using blockchain, Alistair Duke
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Using Blockchain for Evidence Purpose, Rafael Prabucki
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Ad

Recently uploaded (20)

PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
wireless networks, mobile computing.pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
DOC
T Pandian CV Madurai pandi kokkaf illaya
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
Principal presentation for NAAC (1).pptx
PPTX
Feature types and data preprocessing steps
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
Cryptography and Network Security-Module-I.pdf
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
Exploratory_Data_Analysis_Fundamentals.pdf
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
wireless networks, mobile computing.pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
August 2025 - Top 10 Read Articles in Network Security & Its Applications
"Array and Linked List in Data Structures with Types, Operations, Implementat...
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Applications of Equal_Area_Criterion.pdf
PRASUNET_20240614003_231416_0000[1].pptx
T Pandian CV Madurai pandi kokkaf illaya
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Principal presentation for NAAC (1).pptx
Feature types and data preprocessing steps
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Cryptography and Network Security-Module-I.pdf
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK

Incident Response: SIEM Part II