Author
Listed:
- Rahul Marri
- Sriram Varanasi
- Satwik Varma Kalidindi Chaitanya
Abstract
The article focuses on how Next-Gen SIEM can be extended with Data Lakes and AI to improve threat detection and response in current threat landscapes. Conventional SIEM tools have several major disadvantages: they could be more scalable, their false positive rates can be extremely high, and data processing takes too much time due to the constantly growing number and levels of sophistication in cyber threats. These limitations may result in delayed threat detection, alert fatigue, and operations nightmares for security operations. Data Lakes form the center of the proposed architecture to ensure the large raw, unstructured data from different sources are integrated and analyzed in real time. When applied, the system will be able to identify anomalies, evolve with threats, and improve on false positives with the help of superior machine learning algorithms. This integration also solves most of the inherent problems of traditional SIEM and provides more general and efficient solutions for improved security postures for organizations, as this article describes how to orientate CSFs for cybersecurity and SOCs. It demonstrates how various current integrated security technologies improve the detection rates, accuracy, the burden on the security personnel and the human information defense system.
Suggested Citation
Rahul Marri & Sriram Varanasi & Satwik Varma Kalidindi Chaitanya, 2024.
"Integrating Next-Generation SIEM with Data Lakes and AI: Advancing Threat Detection and Response,"
Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023, Open Knowledge, vol. 3(1), pages 446-465.
Handle:
RePEc:das:njaigs:v:3:y:2024:i:1:p:446-465:id:263
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:das:njaigs:v:3:y:2024:i:1:p:446-465:id:263. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Open Knowledge (email available below). General contact details of provider: https://newjaigs.com/index.php/JAIGS/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.