Submitted:
04 December 2023
Posted:
05 December 2023
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
2. Literature Review
3. Enhancing Cybersecurity with AI and ML: The Evolution and Integration of Open XDR
3.1. Integrating Open XDR with AI and Machine Learning Innovations
3.2. Endpoint Detection and Response
3.3. Intrusion Detection Systems
3.3.1. IDS and Open XDR
3.4. Synergy between EDR, IDS and Open XDR
3.5. Security Information and Event Management
3.5.1. SIEM and Open XDR
3.6. Directory Service - Active Directory (AD)
3.7. Active Directory (AD) – Open XDR
3.8. Applications – Applications and Open XDR
3.9. Log Forwarding and Open XDR
4. Discussion
4.1. The Pivotal Role of Open XDR in Reinventing Cybersecurity Through AI and ML Integration
4.2. The Catalytic Role of Open XDR
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Kumar, S.; Gupta, U.; Singh, A.K.; Singh, A.K. Artificial Intelligence: Revolutionizing cyber security in the Digital Era. Journal of Computers, Mechanical and Management 2023, 2, 31–42. [Google Scholar] [CrossRef]
- Wheelwright, P. Heraclitus; Colchis Books, 1968. [Google Scholar]
- Firstbrook, P.; Lawson, C. Innovation insight for extended detection and response. Gartner ID G00718616, 2021.
- GEORGE, D.A.S.; George, A.H.; Baskar, T.; Pandey, D. XDR: The Evolution of Endpoint Security Solutions-Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 2021, 8, 493–501. [Google Scholar] [CrossRef]
- George, A.S.; Sagayarajan, S.; Baskar, T.; George, A.H. Extending Detection and Response: How MXDR Evolves Cybersecurity. Partners Universal International Innovation Journal 2023, 1, 268–285. [Google Scholar]
- Olteanu, I.-C. Evaluating the response effectiveness of XDR technology in a scaled down environment”.
- Taneski, N.; Petrovski, A.; Bogatinov, D. Geography in geospatial intelligence-C4IRS and cyber security. Security and crisis management–theory and practice, pp. 65–73, 2019.
- Butkovic, A.; Orucevic, F.; Tanovic, A. Using whois based geolocation and google maps api for support cybercrime investigations. presented at the WSEAS International Conference on Circuits, Systems, Communications, Computers and Applications (CSCCA’13), 2013, pp. 194–201.
- Brandao, P.R.; Nunes, J. Extended Detection and Response”.
- Kaur, H.; Tiwari, R. Endpoint detection and response using machine learning. presented at the Journal of Physics: Conference Series, IOP Publishing; 2021; p. 012013. [Google Scholar]
- Karantzas, G.; Patsakis, C. An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. Journal of Cybersecurity and Privacy 2021, 1. [Google Scholar] [CrossRef]
- Raff, E.; et al. An investigation of byte n-gram features for malware classification. Journal of Computer Virology and Hacking Techniques 2018, 14, 1–20. [Google Scholar] [CrossRef]
- Šrndić, N.; Laskov, P. Practical evasion of a learning-based classifier: A case study. presented at the 2014 IEEE symposium on security and privacy, IEEE, 2014, pp. 197–211.
- Al-Gethami, K.M.; Al-Akhras, M.T.; Alawairdhi, M. Empirical evaluation of noise influence on supervised machine learning algorithms using intrusion detection datasets. Security and Communication Networks 2021, 2021, 1–28. [Google Scholar] [CrossRef]
- Panagiotakopoulos, G. Assessing open and closed EDRs. 2023.
- Γ. Κωστόπουλος. Aξιολόγηση Open Source Λύσεων στο χώρο της τεχνολογίας EDR. 2023.
- Skopik, F.; Settanni, G.; Fiedler, R. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security 2016, 60, 154–176. [Google Scholar]
- González-Granadillo, G.; González-Zarzosa, S.; Diaz, R. Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors 2021, 21, 4759. [Google Scholar] [CrossRef]
- Bhatt, S.; Manadhata, P.K.; Zomlot, L. The operational role of security information and event management systems. IEEE security & Privacy 2014, 12, 35–41. [Google Scholar]
- Žgela, M.; Penga, I. Security Information and Event Management–Capabilities, Challenges and Event Analysis in the Complex IT System. in Central European Conference on Information and Intelligent Systems, Faculty of Organization and Informatics Varazdin, 2019, pp. 259–266. Available online: https://search.proquest.com/openview/4d4bac43b7c2bce82f3d54cc1b380f25/1?pq-origsite=gscholar&cbl=1986354 (accessed on 4 November 2023).
- Pavlik, J.; Komarek, A.; Sobeslav, V. Security information and event management in the cloud computing infrastructure. in 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI), IEEE, 2014, pp. 209–214. Available online: https://ieeexplore.ieee.org/abstract/document/7028677/ (accessed on 4 November 2023).
- Frigård, J. Security Information and Event Management Systems Monitoring Automation Systems. Master’s Thesis, 2019. Available online: https://trepo.tuni.fi/handle/10024/117593 (accessed on 4 November 2023).
- Suarez-Tangil, G.; Palomar, E.; Ribagorda, A.; Zhang, Y. Towards an intelligent security event information management system. Advances in Security Information Management: Perceptions and Outcomes, 2014. Available online: https://nms.kcl.ac.uk/guillermo.suarez-tangil/papers/2013nova-AIS-SIEM.pdf (accessed on 4 November 2023).
- Radoglou-Grammatikis, P.; Sarigiannidis, P.; Iturbe, E.; Rios, E.; Martinez, S.; Sarigiannidis, A.; Eftathopoulos, G.; Spyridis, Y.; Sesis, A.; Vakakis, N.; et al. Spear siem: A security information and event management system for the smart grid. Computer Networks 2021, 193, 108008. [Google Scholar] [CrossRef]
- Badhwar, R. The Case for AI Artificial intelligence (AI)/ML Machine learning (ML) in Cybersecurity. in The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Springer, 2021, pp. 45–73.
- Blasch, E.; Pham, T.; Chong, C.Y.; Koch, W.; Leung, H.; Braines, D.; Abdelzaher, T. Machine learning/artificial intelligence for sensor data fusion–opportunities and challenges. IEEE Aerospace and Electronic Systems Magazine 2021, 36, 80–93. [Google Scholar] [CrossRef]
- Kinyua, J.; Awuah, L. AI/ML in Security Orchestration, Automation and Response: Future Research Directions. Intelligent Automation & Soft Computing 2021, 28. [Google Scholar]
- Sheeraz, M.; et al. Effective Security Monitoring Using Efficient SIEM Architecture. Hum.-Centric Comput. Inf. Sci 2023, 13, 1–18. [Google Scholar]
- Younus, Z.; Alanezi, M. A Survey on Network Security Monitoring: Tools and Functionalities. Mustansiriyah Journal of Pure and Applied Sciences 2023, 1, 55–86. [Google Scholar]
- Dhamodaran, S.; Dandothikar, C.; Reddy, C.S.P.; Janapati, J.T. An Extensive Review of Literature on IDS and IPS”.
- Chilberto, J.; et al. Identity Security with Azure Active Directory. Cloud Debugging and Profiling in Microsoft Azure: Application Performance Management in the Cloud, pp. 215–234, 2020.
- Zhao, D.; et al. Botnet detection based on traffic behavior analysis and flow intervals. computers & security 2013, 39, 2–16. [Google Scholar]
- Iyer, N.C.; Kabbur, A.M.; Wali, H.G. Implementation of Active Directory for efficient management of networks. Procedia Computer Science 2020, 172, 112–114. [Google Scholar] [CrossRef]
- Kotlaba, L.; Buchovecká, S.; Lórencz, R. Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques.. presented at the ICISSP, 2021, pp. 376–383.
- Uppströmer, V.; Råberg, H. Detecting lateral movement in microsoft active directory log files: A supervised machine learning approach. 2019.
- Lukas, O.; Garcia, S. Deep generative models to extend active directory graphs with honeypot users. arXiv 2021, arXiv:2109.06180. [Google Scholar]
- Dhir, N.; Hoeltgebaum, H.; Adams, N.; Briers, M.; Burke, A.; Jones, P. Prospective artificial intelligence approaches for active cyber defence. arXiv 2021, arXiv:2104.09981. [Google Scholar]
- Alazab, A.; Hobbs, M.; Abawajy, J.; Alazab, M. Using feature selection for intrusion detection system. in 2012 International Symposium on Communications and Information Technologies (ISCIT), Gold Coast, Australia: IEEE, Oct. 2012, pp. 296–301. [CrossRef]
- Creech, G. Developing a high-accuracy cross platform Host-Based Intrusion Detection System capable of reliably detecting zero-day attacks. UNSW Sydney, 2014.
- Dua, S.; Du, X. Data Mining and Machine Learning in Cybersecurity; CRC press, 2016. [Google Scholar]
- Hosney, E.S.; Halim, I.T.A.; Yousef, A.H. An artificial intelligence approach for deploying zero trust architecture (zta). presented at the 2022 5th International Conference on Computing and Informatics (ICCI), IEEE, 2022, pp. 343–350.
- Nichols, J.; Spakes, K.; Watson, C.; Bridges, R. Assembling a cyber range to evaluate artificial intelligence/machine learning (AI/ML) security tools. presented at the ICCWS 2021 16th International Conference on Cyber Warfare and Security, Academic Conferences Limited, 2021, p. 240.
- Muthuraj, S.; Sethumadhavan, M.; Amritha, P.; Santhya, R. Detection and prevention of attacks on active directory using SIEM. presented at the Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2020, Volume 2, Springer, 2021, pp. 533–541.
- Younisse, R.; Alkasassbeh, M.; Almseidin, M.; Abdi, H. AN EARLY DETECTION MODEL FOR KERBEROASTING ATTACKS AND DATASET LABELING. Jordanian Journal of Computers and Information Technology 2023, 9. [Google Scholar] [CrossRef]
- Shin, B. Security enhancement in defense information system by active directory. University of Delaware, 2019.
- Copeland, M.; Copeland, M. Getting Started with Azure Sentinel and XDR Capabilities. Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services, pp. 77–103, 2021.
- Firstbrook, P.; et al. Top trends in cybersecurity 2022. Gartner Inc, 2022.
- Zhu, J.; et al. Tools and benchmarks for automated log parsing. presented at the 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), IEEE, 2019, pp. 121–130.
- Zhang, X.; et al. Robust log-based anomaly detection on unstable log data. presented at the Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019, pp. 807–817.
- Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security 2012, 31, 357–374. [Google Scholar]
- Rudd, E.M.; Rozsa, A.; Gunther, M.; Boult, T.E. A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. IEEE Commun. Surv. Tutorials 2017, 19, 1145–1172. [Google Scholar] [CrossRef]
- Labonne, M. Anomaly-based network intrusion detection using machine learning. Institut polytechnique de Paris, 2020.
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials 2015, 18, 184–208. [Google Scholar]
- Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM computing surveys (CSUR) 2009, 41, 1–58. [Google Scholar] [CrossRef]
- Amanullah, M.A.; et al. Deep learning and big data technologies for IoT security. Computer Communications 2020, 151, 495–517. [Google Scholar] [CrossRef]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. presented at the 2009 IEEE symposium on computational intelligence for security and defense applications, Ieee, 2009, pp. 1–6.
- Stolfo, S.J.; Fan, W.; Lee, W.; Prodromidis, A.; Chan, P.K. Cost-based modeling for fraud and intrusion detection: Results from the JAM project. presented at the Proceedings DARPA Information Survivability Conference and Exposition. DISCEX’00, IEEE, 2000, pp. 130–144.
- Meyers, R. Data highway and the digital transformation: arguments for secure, centralised log management. Network Security 2020, 2020, 17–19. [Google Scholar] [CrossRef]
- Diotalevi, T.; et al. Collection and harmonization of system logs and prototypal Analytics services with the Elastic (ELK) suite at the INFN-CNAF computing centre. arXiv 2021, arXiv:2106.02612. [Google Scholar]
- Han, S.; Mao, H.; Dally, W.J. Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding. arXiv, Feb. 15, 2016. Available online: http://arxiv.org/abs/1510.00149 (accessed on 29 October 2023).
- Udipi, S. The event data management problem: getting the most from network detection and response. Network Security 2021, 2021, 12–14. [Google Scholar] [CrossRef]
- Cappelletti, A.; Maglione, S. Developing log analysis for a worldwide distributed system. 2021.
- Yen, T.-F.; Reiter, M.K. Are your hosts trading or plotting? telling p2p file-sharing and bots apart. presented at the 2010 IEEE 30th International Conference on Distributed Computing Systems, IEEE, 2010, pp. 241–252.
- Bogatinovski, J.; Kao, O. Auto-Logging: AI-centred Logging Instrumentation. presented at the 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), IEEE, 2023, pp. 95–100.
- Jones, J.; Ioniţă, A.; Mihai, I.-C. AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities. presented at the International Conference on Cybersecurity and Cybercrime, 2022, pp. 5–22.
- Bonfanti, M.E. Artificial intelligence and the offence-defence balance in cyber security. Cyber Security: Socio-Technological Uncertainty and Political Fragmentation. London: Routledge, pp. 64–79, 2022.
- Das, R.; Sandhane, R. Artificial intelligence in cyber security. presented at the Journal of Physics: Conference Series, IOP Publishing; 2021; p. 042072. [Google Scholar]
- Liao, H.-J.; Lin, C.-H.R.; Lin, Y.-C.; Tung, K.-Y. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 2013, 36, 16–24. [Google Scholar] [CrossRef]
- Trilho, P.C.P.O. Intelligent Systems for Cyber Defence-An Architecture Framework for Cyber Defence using Artificial Intelligence. 2022.
- Islam, M.A. Application of artificial intelligence and machine learning in security operations center. Issues in Information Systems 2023, 24. [Google Scholar]
- Khan, M.T.; Akhunzada, A.; Zeadally, S. Proactive defense for fog-to-things critical infrastructure. IEEE Communications Magazine 2022, 60, 44–49. [Google Scholar] [CrossRef]
- Axelsson, S. Intrusion detection systems: A survey and taxonomy. 2000.
- Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 2011, 1, 80. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).