Gatividhi Guard: The Activity Guardian: Revolutionizing SIEM Technology

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : May 3, 2024 at 11:44 am | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Sania, Neha Sindhu, Yogita Gigras, Shilpa Mahajan

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Student, Associate Professor, Associate Professor, Department of Computer Science and Engineering, The NorthCap University, Gurugram, Department of Computer Science and Engineering, The NorthCap University, Gurugram, Department of Computer Science and Engineering, The NorthCap University, Gurugram, Department of Computer Science and Engineering, The NorthCap University, Gurugram, Haryana, Haryana, Haryana, Haryana, India, India, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nIn the dynamic landscape of cybersecurity, organizations confront increasingly intricate cyber threats that necessitate sophisticated security measures. Conventional systems such as Security Information and Event Management (SIEM) systems face ongoing challenges, they often struggle to effectively detect and mitigate sophisticated attacks within extensive data sets. To address these limitations, the introduction of Gatividhi Guard signifies a paradigm shift in SIEM technology. Gatividhi Guard is an innovative SIEM platform leveraging advanced Artificial Intelligence and Machine Learning (AIML) algorithms. Its primary objective is to empower organizations with enhanced threat detection capabilities and comprehensive user behavior analysis. Through the integration of AIML, Gatividhi Guard excels in swiftly and accurately identifying and neutralizing cyber threats. A distinguishing feature of Gatividhi Guard lies in its ability to track user mouse movements and locations, facilitating the mitigation of insider threats. This proactive approach to monitoring user activity adds a layer of security crucial for safeguarding digital assets. Moreover, Gatividhi Guard offers intuitive dashboards and robust reporting tools, enabling security analysts to gain deeper insights into security events and make informed decisions to mitigate risks effectively. By presenting security data in a user-friendly manner, Gatividhi Guard enhances the efficiency of security operations and strengthens overall cybersecurity posture. This paper elucidates the design and features of Gatividhi Guard, providing comprehensive guidance on its implementation and setup. By elucidating the significance of Gatividhi Guard in protecting digital assets, the paper underscores the indispensable role of AI-driven solutions in addressing modern cybersecurity challenges. Gatividhi Guard emerges as a pivotal asset for organizations seeking to fortify their IT systems against emerging threats. Through the strategic integration of AI and comprehensive user behavior analysis, Gatividhi Guard empowers organizations to confront new cybersecurity challenges with confidence, thereby elevating the overall security resilience of their digital infrastructure.

n

n

n

Keywords: SIEM, Cybersecurity, AI, Machine Learning, Threat Detection, User Behaviour Analysis, Insider Threats, Gatividhi Guard

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Operating Systems Development & Trends(joosdt)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Operating Systems Development & Trends(joosdt)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Sania, Neha Sindhu, Yogita Gigras, Shilpa Mahajan.Gatividhi Guard: The Activity Guardian: Revolutionizing SIEM Technology.Journal of Operating Systems Development & Trends.May 3, 2024; 11(01):-.

n

How to cite this URL: Sania, Neha Sindhu, Yogita Gigras, Shilpa Mahajan , Gatividhi Guard: The Activity Guardian: Revolutionizing SIEM Technology joosdt May 3, 2024 {cited May 3, 2024};11:-. Available from: https://journals.stmjournals.com/joosdt/article=May 3, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] nn

n[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

1. Williams A. Security information and event management technologies. Siliconindia. 2006;10(1):34–5.
2. Liu H. A insider threat detection system based on user and entity behavior analysis. In Journal of Physics: Conference Series 2021 Aug 1 (Vol. 1994, No. 1, p. 012021). IOP Publishing.
3. Roohparvar R. What is SIEM software? How it works and how to choose the right tool? – Cyber Security Solutions, Compliance, and Consulting Services – IT Security. Cyber Security Solutions, Compliance, and Consulting Services – IT Security – We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization. 2019. Available from: https://www.infoguardsecurity.com/what-is-siem-software-how-it-works-and-how-to-choose-the-right-tool/ 4. Abidar R, Moummadi K, Moutaouakkil F, Medromi H. Intelligent and pervasive supervising platform for information system security based on multi-agent systems. International review on computers and software. 2015;10(1):44–51. 5. Gates C, Taylor C. Challenging the anomaly detection paradigm: A provocative discussion. InProceedings of the 2006 workshop on New security paradigms 2006 Sep 19 (pp. 21–29).
6. Quadrant M. Magic quadrant for security information and event management. Magic Quadrant. 2014.1–16.
7. Customize anomaly scoring rules – Splunk Documentation. Splunk.com. 2022. Available from: https://docs.splunk.com/Documentation/UBA/5.0.5.1/Admin/ScoringRules
8. Amos Z. Combine Machine Learning and UEBA for Advanced Threat Detection. Isa.org. 2024. Available from: https://gca.isa.org/blog/combine-machine-learning-and-ueba-for-advanced-threat-detection
9. Salehi V, Veitch B, Smith D. Modeling complex socio‐technical systems using the FRAM: A literature review. Human factors and ergonomics in manufacturing & service industries. 2021 Jan;31(1):118–42.
10. Fan CI, Tseng YF, Su HP, Hsu RH, Kikuchi H. Secure hierarchical bitcoin wallet scheme against privilege escalation attacks. International Journal of Information Security. 2020 Jun;19:245–55.
11. Johnson A. CCNA Cybersecurity Operations Companion Guide. Cisco Press; 2018 Jun 17.
12. Yang IA, Brown JL, George J, Jenkins S, McDonald CF, McDonald VM, Phillips K, Smith BJ, Zwar NA, Dabscheck E. COPD‐X Australian and New Zealand guidelines for the diagnosis and management of chronic obstructive pulmonary disease: 2017 update. Medical Journal of Australia. 2017 Nov;207(10):436–42.
13. Najafi P, Mühle A, Pünter W, Cheng F, Meinel C. MalRank: a measure of maliciousness in SIEM-based knowledge graphs. InProceedings of the 35th Annual Computer Security Applications Conference 2019 Dec 9 (pp. 417–429).
14. Inderwildi O, Zhang C, Wang X, Kraft M. The impact of intelligent cyber-physical systems on the decarbonization of energy. Energy & Environmental Science. 2020;13(3):744–71.
15. Ali S, DiPaola D, Lee I, Sindato V, Kim G, Blumofe R, Breazeal C. Children as creators, thinkers and citizens in an AI-driven future. Computers and Education: Artificial Intelligence. 2021 Jan 1;2:100040.
16. Singh S, Gupta H, Sharma P, Sahi S. Advances in Artificial Intelligence (AI)-assisted approaches in drug screening. Artificial Intelligence Chemistry. 2024 Jun 1;2(1):100039.
17. Li H, Chen W, Tan X, Tan X. Back analysis of geomechanical parameters for rock mass under complex geological conditions using a novel algorithm. Tunnelling and Underground Space Technology. 2023 Jun 1;136:105099.
18. Patel N, Corbett B, Mhaskar P. Model predictive control using subspace model identification. Computers & Chemical Engineering. 2021 Jun 1;149:107276.
19. Arora K, Mahajan S. Detecting denial-of-service attack using dendritic cell approach. InProceedings of the Second International Conference on Information Management and Machine Intelligence: ICIMMI 2020 2021 (pp. 509–516). Springer Singapore.
20. Sharma S, Mahajan S. Design and implementation of a security scheme for detecting system vulnerabilities. International journal of computer network and information security. 2017 Oct 1;11(10):24.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal of Operating Systems Development & Trends

n

[if 344 not_equal=””]ISSN: 2454-9355[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received April 9, 2024
Accepted April 20, 2024
Published May 3, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]