Copyright © 2024 The Author(s): This is an open-access article distributed under the terms of the Creative
Commons Attribution 4.0 International License (CC BY-NC 4.0)
International Journal of Scientific Research in Science and Technology
Available online at : www.ijsrst.com
Print ISSN: 2395-6011 | Online ISSN: 2395-602X doi : https://doi.org/10.32628/IJSRST24113123
613
Securing Systems using SIEM and FIM Tools
Ms Vaishali Kumar
*1
, Abhishek Yadav
2
, Shivam Bhorde
3
*
1
Lecturer, Department Computer Science Engineering and Applications, DY Patil International University, Akurdi, Pune, Maharashtra, India
2
Student, Department Computer Science Engineering and Applications, DY Patil International University, Akurdi, Pune, Maharashtra, India
3
Student, Department Computer Science Engineering and Applications, DY Patil International University, Akurdi, Pune, Maharashtra, India
A R T I C L E I N F O A B S T R A C T
Article History:
Accepted: 20 May 2024
Published: 12 June 2024
Today, computer networks are heavily documented security issues, making
it impractical to manage them without Security Event Management (SIEM).
A SIEM solution sets the controls everywhere, enhances information
security, recording data from various devices and applications through
agents or networks Protects data by aggregating and aggregating Provides
filtering, normalization of redundant information it is proprietary, and they
use context to analyze it. The SIEM solution provides threat detection and
real-time system activity analysis, alerting operators in the event of an
attack. Although there are high-quality SIEM solutions, success cannot be
guaranteed. Instead, organizations should focus on a variety of use cases to
effectively implement their SIEM solutions. Care must be taken with respect
to the integrity of the operating system components. They are controlled to
optimize system security. Attackers will always try to manipulate or alter
these relevant resources to achieve their goals. System files are common
targets for attackers. File integrity monitoring tools are often used to detect
any malicious changes to these important files. In this project we developed
a comprehensive security solution that combines a Security Information
Event Management (SIEM) framework with a File Integrity Monitoring
(FIM) tool to optimize the security posture of IT projects. Our SIEM project
uses Azure Monitoring Agent to collect data from virtual machine and inject
it into the Log Analytics Workspace. The FIM component is implemented by
a Python script designed to scan multiple directories and files. The script
initially stores the hashes of all monitored files in a baseline file named
“baseline.txt” and creates backups of the original files. These backups are
periodically updated, with old backups being deleted.
Keywords: Security Information and Event Management (SIEM), File
Integrity Monitoring (FIM), Log data management, Threat detection, Azure
Monitoring Agent, Baseline file.
Publication Issue :
Volume 11, Issue 3
May-June-2024
Page Number :
613-621