Optimizing endpoint detection and monitoring in enterprise solution: A cyber threat intelligence approach

Advanced cyber threat intelligence systems are crucial at a time when enterprise solutions are increasing and are being targeted by more sophisticated cyberattacks. This research aims to improve endpoint detection and monitoring in enterprises by installing a Security Information and Event Managemen...

Full description

Saved in:
Bibliographic Details
Published inComputer and information technology pp. 2683 - 2688
Main Authors Sarker, Apurba, Mondal, Joty Prokash, Seraj, Mehnaz, Noor, Jannatun
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.12.2024
Subjects
Online AccessGet full text
ISSN2474-9656
DOI10.1109/ICCIT64611.2024.11021895

Cover

Abstract Advanced cyber threat intelligence systems are crucial at a time when enterprise solutions are increasing and are being targeted by more sophisticated cyberattacks. This research aims to improve endpoint detection and monitoring in enterprises by installing a Security Information and Event Management (SIEM) system based on Wazuh having an open-source robust and flexible Host Intrusion Detection System (HIDS) with integration into ELK Stack. The infrastructure creates a powerful combination of analytical security, intrusion detection, log data analysis, file integrity monitoring (FIM), and vulnerability management capabilities using the Wazuh active response module to detect security threats and continuous monitoring. Wazuh provides a robust and cost-effective solution that instantly detects and monitors simulated attacks such as denial-of-service (DoS) attacks by spotting suspicious file changes in real-time, SSH authentication failure, and identifying the root source of the flood of requests. This study also provides useful insights on designing and deploying comprehensive cybersecurity solutions with open-source tools such as Wazuh, making visual insights for file integrity monitoring (FIM) in real time.
AbstractList Advanced cyber threat intelligence systems are crucial at a time when enterprise solutions are increasing and are being targeted by more sophisticated cyberattacks. This research aims to improve endpoint detection and monitoring in enterprises by installing a Security Information and Event Management (SIEM) system based on Wazuh having an open-source robust and flexible Host Intrusion Detection System (HIDS) with integration into ELK Stack. The infrastructure creates a powerful combination of analytical security, intrusion detection, log data analysis, file integrity monitoring (FIM), and vulnerability management capabilities using the Wazuh active response module to detect security threats and continuous monitoring. Wazuh provides a robust and cost-effective solution that instantly detects and monitors simulated attacks such as denial-of-service (DoS) attacks by spotting suspicious file changes in real-time, SSH authentication failure, and identifying the root source of the flood of requests. This study also provides useful insights on designing and deploying comprehensive cybersecurity solutions with open-source tools such as Wazuh, making visual insights for file integrity monitoring (FIM) in real time.
Author Noor, Jannatun
Sarker, Apurba
Mondal, Joty Prokash
Seraj, Mehnaz
Author_xml – sequence: 1
  givenname: Apurba
  surname: Sarker
  fullname: Sarker, Apurba
  email: apurba.sarker@g.bracu.ac.bd
  organization: Brac University,Department of CSE,Dhaka,Bangladesh
– sequence: 2
  givenname: Joty Prokash
  surname: Mondal
  fullname: Mondal, Joty Prokash
  email: joytiprokash.mondal@g.bracu.ac.bd
  organization: Brac University,Department of CSE,Dhaka,Bangladesh
– sequence: 3
  givenname: Mehnaz
  surname: Seraj
  fullname: Seraj, Mehnaz
  email: seraj.mehnaz@bracu.ac.bd
  organization: Brac University,Department of CSE,Dhaka,Bangladesh
– sequence: 4
  givenname: Jannatun
  surname: Noor
  fullname: Noor, Jannatun
  email: jannatun.noor@bracu.ac.bd
  organization: Brac University,Department of CSE,Dhaka,Bangladesh
BookMark eNo10M1KAzEUBeAoCtbaN3CRF5ia_0zclUHrQKGb7kuSudNGpsmQiYv69LaoqwuHj8PhPqK7mCIghClZUkrMS9s07U4JRemSESauIaO1kTdoYbSpOaeSGmLELZoxoUVllFQPaDFNn4QQqhhlRM5Q2I4lnMJ3iAcMsRtTiAV3UMCXkCK2scOnFENJ-SpCvKACecxhAjyl4euqXvEK-7ODjMsxgy0XVmAYwgGiB2zHMSfrj0_ovrfDBIu_O0e797dd81Fttuu2WW2qYHipaiNcX-tOgVJaOyZ6Z53oCfFcO2eZpZxq2RtdO08k9FQorYTjXCrnvAQ-R8-_tQEA9pehJ5vP-__n8B-_OV3U
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCIT64611.2024.11021895
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798331519094
EISSN 2474-9656
EndPage 2688
ExternalDocumentID 11021895
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
AAJGR
ALMA_UNASSIGNED_HOLDINGS
CBEJK
IPLJI
RIE
RIL
ID FETCH-LOGICAL-i93t-894bf87d6e6677b24fbab4f00c37bba2a13175f978bc05ef146764b3356bbc5e3
IEDL.DBID RIE
IngestDate Wed Aug 27 01:45:46 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i93t-894bf87d6e6677b24fbab4f00c37bba2a13175f978bc05ef146764b3356bbc5e3
PageCount 6
ParticipantIDs ieee_primary_11021895
PublicationCentury 2000
PublicationDate 2024-Dec.-20
PublicationDateYYYYMMDD 2024-12-20
PublicationDate_xml – month: 12
  year: 2024
  text: 2024-Dec.-20
  day: 20
PublicationDecade 2020
PublicationTitle Computer and information technology
PublicationTitleAbbrev ICCIT
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001621205
Score 1.8947805
Snippet Advanced cyber threat intelligence systems are crucial at a time when enterprise solutions are increasing and are being targeted by more sophisticated...
SourceID ieee
SourceType Publisher
StartPage 2683
SubjectTerms Brute-force attack
Cyber threat intelligence
Denial of Service (DoS) attack
Elastic-search
ELK Stack
Endpoint detection
File integrity monitoring (FIM)
Filebeat
Malware
Monitoring
Network intrusion detection
Pipelines
Privacy
Real-time monitoring
Real-time systems
Scalability
Security Information and Event Management (SIEM)
Threat assessment
Visualization
Wazuh
Title Optimizing endpoint detection and monitoring in enterprise solution: A cyber threat intelligence approach
URI https://ieeexplore.ieee.org/document/11021895
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA62J08qVnyTg9fdprt57HqTYmkFq4cKvZVMMouLdFvq9mB_vclu16ogeAuBhCGTzCvfzBBy49weYTVXASQKAm6yXpAmsQyUSEViILUSfWjgcSyHL_xhKqbbZPUqFwYRK_AZhn5Y_eXbhVn7UFm35_tQJ6lokZa7Z3Wy1i6gIp0UZqJB67C0O-r3RxPJZc_7gREPm-U_GqlUemRwQMYNBTV85C1clxCaza_ijP8m8ZB0dil79PlLGR2RPSyOSf7kBMI837gZioVdLvKipBbLCn5VUF1YOq_etA_u0bygWEMQ83ekzZ28pXfUfACuaPnqDUyafyviSZuS5B0yGdxP-sNg21shyNO4DJKUQ5YoxwkplYKIZ6CBZ4yZWAHoSPe8XZE5FxMME5h5eSo5OMZKACMwPiHtYlHgKaEGI6bAJkxp5KCkTqRlOhZuF6Uts2ek449ptqyrZ8yaEzr_Y_6C7HtuechIxC5Ju1yt8cop_hKuK4Z_AilHr5w
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDDABoog3HlgT3MSPhA1VoJZHYQgSW-WzLyJCTStIB_j12EnDS0JiszycrDv7Xv7ujpATF_YIq7kKIFEQcJP3gjSJZaBEKhIDqZXoUwO3Izl44FeP4nFRrF7XwiBiDT7D0C_rv3w7NXOfKjvt-TnUSSqWyYoz_Fw05VpfKRXp9DATLV6HpafDfn-YSS57PhKMeNgS-DFKpbYkl-tk1J6hAZA8h_MKQvP-qz3jvw-5QbpfRXv0_tMcbZIlLLdIcedUwqR4dzsUSzubFmVFLVY1AKukurR0Ur9qn96jRUmxASEWr0jbW3lGz6l5A3yh1ZN3MWnxrY0nbZuSd0l2eZH1B8FiukJQpHEVJCmHPFFOFlIqBRHPQQPPGTOxAtCR7nnPIndBJhgmMPcaVXJwopUARmC8TTrltMQdQg1GTIFNmNLIQUmdSMt0LBwVpS2zu6Tr2TSeNf0zxi2H9v7YPyarg-z2ZnwzHF3vkzUvOQ8gidgB6VQvczx0bkAFR7XwPwCGyrLp
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Computer+and+information+technology&rft.atitle=Optimizing+endpoint+detection+and+monitoring+in+enterprise+solution%3A+A+cyber+threat+intelligence+approach&rft.au=Sarker%2C+Apurba&rft.au=Mondal%2C+Joty+Prokash&rft.au=Seraj%2C+Mehnaz&rft.au=Noor%2C+Jannatun&rft.date=2024-12-20&rft.pub=IEEE&rft.eissn=2474-9656&rft.spage=2683&rft.epage=2688&rft_id=info:doi/10.1109%2FICCIT64611.2024.11021895&rft.externalDocID=11021895