Cybersecurity On A Budget Evaluating Security and
Cybersecurity On A Budget Evaluating Security and
Cybersecurity On A Budget Evaluating Security and
RESEARCH ARTICLE
1 School of Computer Science, University of Galway, Galway, Ireland, 2 National Center for Cyber Security,
Islamabad, Pakistan, 3 Faculty of Computing and AI, Air University, Islamabad, Pakistan
a1111111111
Abstract
a1111111111 The proliferation of cyber threats necessitates robust security measures to safeguard critical
a1111111111
a1111111111 assets and data in today’s evolving digital landscape. Small and Medium Enterprises
a1111111111 (SMEs), which are the backbone of the global economy are particularly vulnerable to these
threats due to inadequate protection for critical and sensitive information, budgetary con-
straints, and lack of cybersecurity expertise and personnel. Security Information and Event
Management (SIEM) systems have emerged as pivotal tools for monitoring, detecting, and
OPEN ACCESS responding to security incidents. While proprietary SIEM solutions have historically domi-
nated the market, open-source SIEM systems have gained prominence for their accessibil-
Citation: Manzoor J, Waleed A, Jamali AF, Masood
A (2024) Cybersecurity on a budget: Evaluating ity and cost-effectiveness for SMEs. This article presents a comprehensive study focusing
security and performance of open-source SIEM on the evaluation of open-source SIEM systems. The research investigates the capabilities
solutions for SMEs. PLoS ONE 19(3): e0301183. of these open-source solutions in addressing modern security challenges and compliance
https://doi.org/10.1371/journal.pone.0301183
with regulatory requirements. Performance aspects are explored through empirical testing
Editor: Viacheslav Kovtun, Institute of Theoretical in simulated enterprise-grade SME network environments to assess resource utilization,
and Applied Informatics Polish Academy of
and real-time data processing capabilities. By providing a rigorous assessment of the secu-
Sciences: Instytut Informatyki Teoretycznej i
Stosowanej Polskiej Akademii Nauk, UKRAINE rity and performance features of open-source SIEM systems, this research offers valuable
insights to cybersecurity practitioners, organizations seeking cost-effective security solu-
Received: December 11, 2023
tions, and the broader academic community. The findings shed light on the strengths and
Accepted: March 12, 2024
limitations of these systems, aiding decision-makers in selecting the most suitable SIEM
Published: March 28, 2024 solution for their specific requirements while enhancing the cybersecurity posture of SMEs.
Copyright: © 2024 Manzoor et al. This is an open
access article distributed under the terms of the
Creative Commons Attribution License, which
permits unrestricted use, distribution, and
reproduction in any medium, provided the original
author and source are credited. 1 Introduction
Data Availability Statement: All relevant data are SMEs play a crucial role in driving innovation, yet they fail to adequately strategize their cyber-
within the manuscript.
security defense. One of the reasons for this oversight is underestimating the risks and impact
Funding: The author(s) received no specific of cyber attacks. There is often a misconception that cybercriminals only go after large, high-
funding for this work. profile organizations. Unfortunately, this couldn’t be further from the truth. Verizon’s data
Competing interests: The authors have declared breach investigation report [1] reveals that nearly 43% of cyber attacks are targeted at SMEs.
that no competing interests exist. Another reason for the inadequate cybersecurity posture of SMEs is that due to limited
financial and human resources, they struggling to keep up with the constant advancements in
this rapidly evolving domain. SMEs often find themselves unprepared to select the right tools
to safeguard their assets, thereby jeopardizing their business continuity. Since the outbreak of
the COVID-19 pandemic and the lockdowns that ensued worldwide, organizations have
adopted remote work and the employees access the organization’s systems remotely from their
homes. This has created new opportunities for malicious actors and an increase in cyber
attacks has been observed following the COVID-19 pandemic. The European Union Agency
for Cybersecurity, ENISA [2], found that cybersecurity challenges were exasperated further by
the impact of the COVID-19 pandemic and that SMEs were unprepared to cope with these
challenges. A recent survey of 85 UK-based SMEs explored their threat and coping appraisals
toward cyber attacks. A major concern shown by SMEs was keeping mobile devices safe and
avoiding phishing attacks [3]. Employing the defense-in-depth strategy, organizations deploy a
number of security solutions such as Next Generation Intrusion Detection and Prevention
Systems (NG-IDPS), firewalls, antivirus solutions, network segmentation etc. These security
solutions are deployed across complete network infrastructure to ensure real-time security
through continuous monitoring and response [4].
Despite the availability of a variety of security solutions, analysts have a hard time monitor-
ing multiple dashboards simultaneously and correlating events from different security devices.
Moreover, these devices generate a huge amount of data (logs) in multiple formats thus over-
whelming the log management. This issue is particularly important for SMEs that usually have
limited human resources and managing security can often be a part-time job for a single indi-
vidual [5]. This makes them an easy target for cybercriminals. Therefore, a pragmatic approach
for SMEs is unified security management. SIEM system facilitates this with efficient collection
of data from disparate log sources into a single system for real-time analysis [6] delivered to a
single console. SIEM system itself is not an active monitoring device in the network but is a
powerful security solution to monitor logs from multiple devices and correlate them in real-
time to observe any malicious activity that may be overlooked by other network parametric
defense solutions [7].
There are two broad categories of SIEM solutions, commercial and open-source, with
inherent benefits and limitations. Commercial SIEM solutions are quite mature and provide
full enterprise-level coverage, albeit with huge licensing costs. For instance, the three-year
total cost of ownership (TCO) for LogRhythm and SolarWinds LEM starts from $50,000
and the same for AlienVault USM, IBM Qradar and HP ArchSight starts from $250,000.
Open-source solutions do not incur any cost and are open for modification or customiza-
tion; however, they are usually restricted in terms of features and lack customer support.
There are a number of open-source SIEM solutions available in the market, however, the
selection of an optimum SIEM solution can be a difficult job for most SMEs due to the lack
of expertise and resources to perform detailed comparisons and testing of security and per-
formance features of each. While evaluations of commercial SIEM solutions are often pro-
vided by their vendors, and institutes such as Gartner [8], InfoTech Research Group,
TechTarget, InfoWorld and CSO Online also perform a comparative analysis of commercial
SIEM solutions annually, such evaluations and comparisons are largely missing for open-
source SIEM solutions. The innovation, security analysis and performance evaluation of
open-source SIEM solutions rely on the research community. Researchers are actively work-
ing to improve these solutions by integrating open-source intelligence (OSINT) and Artifi-
cial Intelligence (AI).
This research work aims to investigate the technical underpinnings of SIEM and perform
an experimental evaluation of the security features and performance of state-of-the-art open-
source SIEM solutions that suit the security and compliance needs of SMEs while staying
within the resource constraints that are inherent in smaller organizations. The main research
questions that we want to answer are the following:
• What are the key security features and capabilities offered by open-source SIEM solutions,
and how do they compare to commercial SIEM solutions?
• What are the performance benchmarks of different open-source SIEM solutions under high
traffic load and event data volume?
• What are the scalability limitations of open-source SIEM solutions, and how do they per-
form as the size and complexity of the monitored network infrastructure grow?
• How do open-source SIEM solutions address compliance and regulatory requirements, and
what kind of reports do they provide for auditing purposes?
• To what extent do open-source SIEM solutions support cyber threat intelligence integration
to identify emerging threats?
Prior work on the evaluation of open-source SIEM systems largely focused on theoretical
analysis of architectural components and basic features; thus, omitting important performance
metrics such as Events Per Second (EPS) assessment and evaluation of various security fea-
tures. Secondly, SIEM is a constantly evolving field with new entrants coming to market and
new innovative features being added to existing products. Therefore, prior studies can become
outdated, and new research on the security and performance evaluation of state-of-the-art
open-source SIEM solutions is necessary. To this end, we provide a detailed security and per-
formance evaluation of the latest open-source SIEM solutions. Our main contributions are:
• We have performed a detailed security and performance evaluation of the most popular and
widely used open-source SIEM solutions.
• We have developed a ranking mechanism based on essential and desirable features of SIEM.
• We have deployed an enterprise-grade test bed to simulate a real-world network of SMEs to
evaluate SIEM solutions in an operational environment. In particular, the test network was
used to establish the veracity of EPS claims of SIEM solutions.
• We have identified several shortcomings in current open-source SIEM solutions and dis-
cussed potential enhancements that will be implemented in our future work.
The rest of the paper is organized as follows: Section 2 presents SIEM architecture. Section
3 summarizes the previous work on the evaluation of SIEM solutions. Section 4 presents a
brief overview of open-source SIEM solutions. Section 5 describes our evaluation strategy,
parameters and the testing environment. We discuss the results in detail in Section 6, and Sec-
tion 7 concludes the paper and presents some future research directions.
2 SIEM architecture
SIEM system is a comprehensive cybersecurity solution that provides real-time monitoring
and analysis of an organization’s security posture. It helps in detecting and responding to secu-
rity incidents by collecting event data from various sources and correlating them. The architec-
ture of a SIEM system as shown in Fig 1 comprises the following major components:
Intrusion Detection and Prevention Systems (IDPS), Intrusion Prevention Systems (IPS), anti-
virus software, logs from operating systems, databases, web servers and cloud-based applica-
tions and services, data from individual workstations, laptops, and mobile devices, and user
authentication and access logs. Network flow data is also an important source. External data
sources can also provide information about known threats and vulnerabilities in the form of
threat intelligence feeds.
allows for efficient querying, analysis, and reporting. Large volumes of historical security data
are usually stored using data warehousing solutions like Amazon Redshift or Snowflake.
3 Related work
The literature extensively discusses the design of SIEM systems, their applicability to new
domains, feature improvement and evaluation of various SIEM solutions available in the
market.
Prior studies related to the evaluation of SIEM solutions are more focused on the theoretical
comparison of architectural modules and basic capabilities of these systems and the evaluation
criteria have been very subjective. To the best of our knowledge, a comprehensive evaluation
of the security and performance of popular open-source SIEM solutions specifically targeted at
SMEs is largely missing.
based on its effectiveness. ArcSight ESM commercial SIEM solution, AlienVault OSSIM open-
source SIEM solution and E-SIEM self-developed SIEM solution were evaluated using this cri-
teria. The paper lacks coverage of other popular open-source SIEM systems such as Wazuh
and SIEMonster. Moreover, it does not consider a parametric security evaluation of the tar-
geted solutions.
Christopher et al. [35] performed the analysis of architectural components and basic SIEM
capabilities of open-source SIEM solutions, OSSIM, Prelude and Log management solutions
(ELK stack). Kavčič et al. [36] analyzed the basic SIEM capabilities of IBM QRadar, Splunk,
SIEMonster and OSSIM. Sepúlveda et al. [37] discussed the basic functionalities of Splunk ES,
Prelude, Wazuh, and OSSIM. However, these studies do not consider evaluation with respect
to performance and security features.
Other researchers opted to evaluate the capabilities of one specific SIEM solution. Mulyadi
et al. [38] deployed and evaluated the effectiveness of Elastic Stack. Thiele et al. [39] deployed
and analyzed the basic capabilities of the community version of SIEMonster. Särkisaari et al.
[40], analyzed basic SIEM capabilities and deployed Wazuh in a test environment. Bernardo
et al. [41] evaluated the attack detection capability of Wazuh in a test environment by simulat-
ing multiple attacks. However, other open-source SIEM solutions such as OSSIM and SIE-
Monster were dropped due to insufficient documentation and lack of resources required to
deploy the solution. Hence these studies did not provide a comparative analysis with other
SIEM solutions.
Nabil at al. [42] perform a theoretical comparison of OSSIM, ELK and LogPoint SIEM solu-
tions by considering log collection, normalization, correlation and reporting. They also per-
form a small integration test by configuring CheckPoint firewall and OSSEC HIDS with ELK.
The reason for the selection of this particular combination is not clear.
Thakur et al. [43] give an analysis of HP ArcSight by discussing its features such as event
analysis, correlation engine, policies and reporting. They also discuss case studies of some
attacks that can be detected by AlientVault USM, including SQL Injection, Watering Hole
Attack and Malware infection. The authors do not delve into any technical details and do not
provide any experimental evaluation.
OSSIM using IaaS, there are a number of limiting factors. Deploying OSSIM using PaaS and
SaaS is not practical. On the other hand, Qradar is very suitable for IaaS, less so for PaaS and
SaaS. Mokalled et al. [48] presented customer-driven criteria for the selection of SIEM for an
enterprise. The proposed criteria are expected to help consumers in considering all the basic
and advanced factors for evaluating a SIEM solution for an enterprise. A detailed model based
on performance factors and features of the SIEM system is also examined. They also proposed
an approach [49] to support companies that are seeking to adopt SIEM systems into their envi-
ronments. They provide a set of suitable technological and business requirements that are
believed to be valuable in a SIEM system. They provide a template with 14 features: (1) level of
compliance, (2) complexity, (3) capability, (4) robustness, (5) scalability, (6) vision, (7) installa-
tion duration, (8) licensing, (9) support, (10) training, (11) additional features, (12) integration
with third parties, (13) vendor skills, (14) price. This template must be completed for each can-
didate SIEM solution by assigning appropriate weight/importance to each feature. However,
the actual evaluation of a SIEM system using the proposed criteria is not performed. A draw-
back of the proposed approach is that it is subjective and most SMEs lack the human resources
with appropriate technical skills to correctly evaluate each of these features. Secondly, some of
the features like complexity, capability, vision, etc. are too vague. Finally, this is not a practical
approach because deploying and testing a large number of SIEM solutions is a very time-con-
suming and error-prone process.
Based on the consolidated comparison of discussed works, as indicated in Table 1, the fol-
lowing conclusions can be drawn:
• Some prior studies studied SIEM solutions in specialized domains such as IoT, smart grids,
industrial control systems, etc.
• Some studies considered only commercial SIEM solutions for evaluation, which are suitable
only for large enterprises due to huge licensing costs.
• Another group of research studies provided theoretical comparisons of open-source SIEM
solutions but the experimental evaluation of their performance and security features is not
performed.
• Others have performed experimental evaluation, but only for a single SIEM solution in isola-
tion, which does not provide a head-to-head comparison of various SIEMs.
Abbreviations:
A1 Evaluation Criteria A2 Performance Evaluation A3 Security Feature Evaluation
https://doi.org/10.1371/journal.pone.0301183.t001
Our objective is to fill in this research gap by providing a comprehensive analysis of the lat-
est open-source SIEM solutions, considering both performance and security features particu-
larly targeted at SMEs. We propose a ranking mechanism for SIEM systems based on essential
and desirable features. The outcome will aid SMEs in effective decision-making.
4.1 Wazuh
Wazuh [50] is an open-source network security monitoring solution. It evolved from OSSEC,
which itself is an open-source host-based intrusion detection system (IDS). Wazuh provides a
wide range of plugins, that can be integrated to enhance monitoring for multiple security
devices. It also provides secure log collection, vulnerability scanning, user-based access control
and authentication.
4.2 SIEMonster
SIEMonster combines the properties of multiple open-source security solutions and provides
a unified single platform that leverages secure log collection, user authentication, and access
control. SIEMonster’s architecture utilizes the Wazuh agent for endpoint monitoring, ELK
Stack for data collection, processing, storage and visualization, RabbitMQ for queuing and
SearchGuard for encryption and authentication. The community edition of SIEMonster is free
whereas the professional, enterprise and MSSP editions require a subscription ranging from
$600 to $5000 per month.
4.5 Splunk
Splunk Enterprise is an efficient data management platform that provides analysis and visuali-
zation of data [53]. Splunk Enterprise Security (SES) is another solution, which is capable of
correlating events for security analysis and identifying malicious and anomalous events. The
free version of Splunk Enterprise known as SplunkFree is restricted to storing only up to 500
MB of data and does not contain advanced features that are available in SES. Since SplunkFree
does not satisfy the requirements of SMEs, we have not included it for detailed evaluation.
adversary seeks to render a computer or another device inaccessible to its users by disrupting
its regular operations. Typically, this is achieved by overwhelming a targeted machine with a
large number of requests, to the point where it cannot process regular traffic. As a conse-
quence, legitimate users are denied access to the service.
In order to simulate a DoS attack, we set up our testbed with traffic generators, IDS, Fire-
wall and SIEM solutions, each running in a separate VM. We configure syslog in Snort and
pfSense. The SIEM solution is configured to receive the logs. Next, we use Ostinato Traffic
Generator to flood UDP traffic on WAN port of pfSense which blocks the incoming traffic.
The firewall rules are triggered and the logs are forwarded to SIEM system through the
forwarding port. Similarly, we flood traffic on WAN port of Snort which triggers IDS rules to
generate logs for SIEM.
Simulation of malware attack. Malware is malicious software that can steal data or dam-
age the systems. Malware comes in different forms such as viruses, worms, spyware,
ransomware etc. We simulate a malware attack that makes changes to files on the end-user sys-
tems. There are three types of file changes that need to be monitored.
1. Create a new file—Spyware can add a malicious file that records the users’ keystrokes as
they enter sensitive data such as passwords or credit card information.
2. Remove files—Worms can carry a malicious payload that removes critical files.
3. Modify files—Viruses can modify an existing file and try to hide their malicious code inside
it.
In order to simulate such activities, we set up an experiment with multiple end-hosts that
comprise Ubuntu and Windows machines. File Integrity Monitoring (FIM) systems on these
machines examine the files for changes that may indicate an attack. They keep track of the files
when they change, how they change, and who changed them by logging all the information.
These logs are sent through agents that are deployed in the end-host systems. To enable FIM,
we make the required changes in the configuration file of the SIEM agent. Syscheck is enabled
to monitor the system checks in real time. The directories that need to be monitored are speci-
fied. We write a Python script to randomly create, modify and delete files in the monitored
directory. As a result, the FIM module generates logs and forwards them to SIEM whenever a
change is detected in the directory. This methodology is used for OSSIM, Wazuh, and
SIEMonster.
In the case of Elastic Security, the Auditbeat agent is installed in the Ubuntu and Windows
systems. Inside Auditbeat, the path for the directories that need to be monitored for changes is
configured. Whenever changes are detected in these directories, logs are sent in real time to
Elastic Security.
Fig 3. EPS comparison of SIEM systems with events of pfSense and Snort.
https://doi.org/10.1371/journal.pone.0301183.g003
952 and 963, OSSIM 892 and 912, and SIEMonster 798 and 827 for Windows and Ubuntu
respectively. The EPS of Wazuh is more than 200% higher than other SIEM solutions.
A comparison of Figs 3 and 4 also shows that the EPS achieved using the FIM agent is
much lower compared to the Syslog used in pfSense and Snort. The reason is that the FIM logs
received through the agent are larger in size and have more values. There are 25 fields in the
FIM logs as compared to a maximum of 10 fields in Syslog for pfSense and Snort. In addition
to the FIM logs, the agent also sends additional logs like rootkit detection, vulnerability scan-
ning, and active response. These factors are responsible for slower processing and lower EPS
in the case of the logs received through the agent.
Fig 4. EPS comparison of SIEM systems with events of Windows and Ubuntu agents.
https://doi.org/10.1371/journal.pone.0301183.g004
solutions can be differentiated and ranked based on a set of functional features. We have
grouped the features into two sets namely, 1) Primary features and 2) Secondary features. As
the name suggests, primary features are those that are essential for a SIEM system. Secondary
features are desirable and add extra value to the system but are not crucial for a SIEM system.
Primary features. In order to ensure meaningful security evaluation of targeted SIEM
solutions, it is important that all the essential features are considered. Thus we perform a
detailed evaluation of these features for each SIEM solution and determine if the feature is
missing, or has either a basic-level or advanced-level implementation.
1. Event processing speed
One of the most important features for evaluating a SIEM system is its capability to detect
events at high speed. The speed is measured in terms of EPS. We have experimentally evalu-
ated and compared the EPS of the SIEM systems which have already been explained in
detail in Section 5.
2. Correlation Rules
The core purpose of a SIEM system is to detect events using correlation rules. Some SIEM
solutions have rudimentary correlation rules while others have a more advanced and robust
set of rules. We perform a quantitative as well as qualitative analysis of the correlation rules
of each SIEM solution.
3. Rule Customization
Every SIEM system comes with built-in correlation rules. At times, companies need to add
custom rules tailored to their needs, so as to enhance the capabilities of the SIEM solution
they are using. However, not all solutions allow customization. In this feature, we examine
the rule customization capability of the targeted SIEM system.
4. Log Integrity
The integrity of logs is very important for any SIEM system. If an adversary deletes legiti-
mate events from the log while it is in transit from the agent to the SIEM server, correlation
rules will not be fired and alarms will not be generated. In this feature, we evaluate the exis-
tence of mechanisms for ensuring the integrity of the logs sent by the agent to the SIEM
server.
5. Log Retention
SIEM solutions receive a large number of logs from a range of devices. Companies may be
required to keep the logs in storage for several months for compliance purposes and foren-
sic operations. This feature evaluates the duration for which the SIEM solutions retain the
logs in their storage system.
6. User Authentication
While user authentication is important for any system, the requirement for a secure and
resilient authentication system for the SIEM solution is all the more essential due to the crit-
ical nature of the information available on the SIEM dashboard. This feature assesses the
availability and the type of authentication mechanism.
7. Access Control
Access control is an essential feature in a system to manage the roles and responsibilities of
users. SIEM systems also require multiple roles such as Manager, Senior Analyst, and Junior
Analyst and they have different levels of access to various modules of a SIEM system while
they perform the day-to-day operations. In this feature, we evaluate the type of access con-
trol mechanism in the SIEM solutions.
8. Fault tolerance
Fault tolerance is an important requirement for all critical systems. However, not every
solution supports replication, high availability, disaster recovery, etc. SIEM systems are
responsible for continuous monitoring and surveillance of end devices and network assets;
therefore, it becomes important to examine the availability of fault tolerance capabilities of
the SIEM solutions.
9. Visualization
Data visualization is one of the most powerful features of a SIEM system. Lack of interactive
exploration of data and customization of dashboards can adversely affect the effectiveness
of a SIEM system.
10. Compliance
Organizations often need to comply with multiple compliance regulations that provide
guidelines and best practices based on the industry and type of data. These regulations
Secondary features. Secondary features are defined as those features that can provide an
added advantage but are not critical in the context of SMEs. For example, the built-in data
sources provided by the SIEM solution may be enough for an SME. As the size of these organi-
zations is not very large, a highly scalable solution is usually not a primary requirement. Vul-
nerability scanners are commonly available as standalone products and are already used by
most SMEs, therefore the availability of vulnerability scanning capability as part of SIEM is not
of primary importance. Similarly, threat intelligence is an advanced feature that is usually not
considered by SMEs as they lack the financial and human resources to manage it. While active
online community support is certainly beneficial, the documentation of the SIEM solutions is
usually sufficient for configuration and troubleshooting. However, any SIEM solution that
provides these secondary features will of course have an added advantage over others.
1. Custom Data Sources
Most SIEM solutions provide the log parsers for commonly used devices by default. How-
ever, at times we might need to integrate a custom data source whose parser is not available
in the SIEM system. Providing an easy-to-use mechanism for the user to write a plugin to
parse the logs of custom devices can be very useful for the organization.
2. Scalability
Organizations may grow in size with the passage of time and gradually add more sensors
and devices. This feature considers the ability of a SIEM system to support the growing
number of devices and events collected at the edge of the IT infrastructure.
3. Vulnerability Scanning
Vulnerabilities on the networked systems can be exploited by attackers and may lead to
information theft. Vulnerabilities may arise due to a number of reasons such as misconfi-
guration and deployments dependencies, etc. Thus, monitoring the network for vulnerabil-
ities is important. This feature determines the availability of vulnerability scanning
capabilities in the targeted SIEM.
4. Threat Intelligence
Threat intelligence (TI) refers to the collection of data from multiple sources for further
mining and devising a knowledge base for the threat landscape. From the perspective of
SIEM, TI could be used for improving decision-making, policy management and rules
augmentation. The availability of threat analysis tools using standard formats such as STIX,
TAXII, JSON, etc. provides an added advantage to SIEM. This feature evaluates the level of
threat intelligence support in a SIEM solution.
5. Community and Support
Companies providing commercial products have a dedicated team that provides support
and training to clients. Open-source projects thrive on community support. This feature
evaluates the quality of documentation and active online community of developers and
contributors of the SIEM solutions.
Here i is a primary or secondary feature, V is the value of the feature and W is the weight of
the feature.
Suppose X is a primary feature and a SIEM system provides an advanced implementation
of this feature then its score will be 2*3 = 6. Y is another primary feature with basic implemen-
tation, so its score will be 2*2 = 4. Z is a secondary feature that is not implemented, so its score
will be 1*0 = 0. The total score of this particular SIEM solution will be 6+4+0 = 10. The maxi-
mum achievable score according to this methodology is 50. We evaluate the SIEM solutions
and discuss their scores next.
6 Discussion
Security and performance evaluation of the four shortlisted SIEM systems is conducted as per
the scoring methodology using 10 primary and 5 secondary features. The results are summa-
rized in Table 3. The symbol × denotes that the feature is not available, ? denotes basic imple-
mentation and � denotes advanced implementation. Our study shows that Wazuh provides an
advanced implementation of 13 features out of the 15 features we evaluated. Overall, Wazuh
achieved the highest SIEM score of 47 followed by Elastic Security, SIEMonster and OSSIM
with a score of 42, 37 and 26 respectively.
Symbols:
^ Advanced implementation ? Basic implementation × Missing
https://doi.org/10.1371/journal.pone.0301183.t003
an organization wants to add custom rules for various use cases they can do so in all of the
evaluated SIEMs except SIEMonster which does not provide any rule customization capabili-
ties. OSSIM allows the users to add new correlation directives and cross-correlation rules via a
Graphical User Interface (GUI). Similarly, Elastic Security also allows users to add new rules
based on custom queries, thresholds, event correlation, or indicator matches. Custom query-
based rule generates an alert when the rule’s query is matched. Threshold-based rule generates
an alert when a specified field’s value appears a specified number of times in the log during a
single execution. Event correlation rules need to be written using the Event Query Language
(EQL) to match the results. Indicator match-based queries match the field values defined in
the specified indicator index patterns and generate alerts accordingly.
username and password. The password policy usually requires a combination of uppercase let-
ters, lowercase letters, numerical digits and special characters. SIEMonster additionally pro-
vides two-factor authentication which adds an extra layer of security. Similarly, all SIEMs
implement role-based access control (RBAC), which provides the ability to allow administra-
tive capabilities to certain users and restrict other users from accessing such capabilities.
Wazuh provides two RBAC modes; allow list mode where everything is forbidden and the
administrator needs to configure the roles to allow permissions, and a block list mode where
everything is allowed and the administrator needs to restrict permissions for roles. OSSIM
provides three RBAC roles, Read-Only, Analyst and Manager. Elastic Security allows assigning
roles to users or groups and assigning privileges to various roles. SIEMonster also provides
fine-grained role-based access control to indices, documents and fields.
6.5 Visialuzation
SIEM systems collect a huge amount of data from diverse sources and proper data visualization
methods are necessary for the analysis of security events. Wazuh, SIEMonster and Elastic Secu-
rity use Kibana for dashboards and visualization which is extremely powerful. The users can
create custom graphs and charts according to their requirements. OSSIM also provides data
visualization but it is not as rich as the commercial USM version.
6.6 Compliance
Wazuh provides predefined compliance report templates for standards such as the Payment
Card Industry Data Security Standard (PCI DSS), General Data Protection Regulation
(GDPR), Health Insurance Portability and Accountability Act (HIPAA) and Good Practice
Guide 13 (GPG 13). Elastic Security satisfies Federal Information Processing Standards (FIPS),
Federal Information Security Management Act (FISMA), PCI DSS, HIPAA, GDPR, ISO stan-
dards. SIEMonster also provides compliance reports for NIST, HIPAA and other standards.
OSSIM does not provide such reports.
Regular expressions are used in the plugins to match the events. Finally, SIEMonster does not
support customization.
6.8 Scalability
As the organizations grow in size, the requirements for event processing also increase. A
Wazuh cluster which contains a group of cooperating managers can be set up for horizontal
scalability. New nodes can easily be added to the cluster. Similarly, Elastic Security supports
distributed deployment and new nodes can be added to the cluster to achieve scalability. The
community edition of SIEMonster supports only a single server with up to 100 endpoints,
while the multi-server and multi-tenant options are only available in paid versions. OSSIM is
also limited in terms of scalability and does not support multi-tier distributed deployment.
Author Contributions
Conceptualization: Jawad Manzoor, Ammar Masood.
Data curation: Abdul Fareed Jamali.
Formal analysis: Abdul Fareed Jamali.
Investigation: Jawad Manzoor.
Methodology: Abdul Fareed Jamali.
Project administration: Jawad Manzoor, Ammar Masood.
Software: Abdul Waleed.
Supervision: Ammar Masood.
Validation: Abdul Waleed.
References
1. Verizon Data Breach Investigation Report 2023;. https://www.verizon.com/business/en-gb/resources/
reports/dbir/.
2. ENISA Threat LANDSCAPE 2021;. https://www.enisa.europa.eu/publications/enisa-threat-landscape-
2021/@@download/fullReport.
3. Wilson M, McDonald S, Button D, McGarry K. It Won’t Happen to Me: Surveying SME Attitudes to
Cyber-security. Journal of Computer Information Systems. 2022; 0(0):1–13. https://doi.org/10.1080/
08874417.2022.2067791
4. Akhtar S, Sheorey PA, Bhattacharya S, VV AK. Cyber Security Solutions for Businesses in Financial
Services: Challenges, Opportunities, and the Way Forward. International Journal of Business Intelli-
gence Research (IJBIR). 2021; 12(1):82–97. https://doi.org/10.4018/IJBIR.20210101.oa5
5. Mijnhardt F, Baars T, Spruit M. Organizational Characteristics Influencing SME Information Security
Maturity. Journal of Computer Information Systems. 2016; 56(2):106–115. https://doi.org/10.1080/
08874417.2016.1117369
6. Menges F, Latzo T, Vielberth M, Sobola S, Pöhls HC, Taubmann B, et al. Towards GDPR-compliant
data processing in modern SIEM systems. Computers & Security. 2020; p. 102165.
7. Majeed A, ur Rasool R, Ahmad F, Alam M, Javaid N. Near-miss situation based visual analysis of SIEM
rules for real time network security monitoring. Journal of Ambient Intelligence and Humanized Comput-
ing. 2019; 10(4):1509–1526. https://doi.org/10.1007/s12652-018-0936-7
8. Magic Quadrant for Security Information and Event Management; 2022. https://www.gartner.com/en/
documents/4019750.
9. Sornalakshmi K. Detection of DoS attack and zero day threat with SIEM. In: 2017 International Confer-
ence on Intelligent Computing and Control Systems (ICICCS); 2017. p. 1–7.
10. Bryant BD, Saiedian H. Improving SIEM alert metadata aggregation with a novel kill-chain based classi-
fication model. Computers & Security. 2020; 94:101817. https://doi.org/10.1016/j.cose.2020.101817
11. Menges F, Latzo T, Vielberth M, Sobola S, Pöhls HC, Taubmann B, et al. Towards GDPR-compliant
data processing in modern SIEM systems. Computers & Security. 2021; 103:102165. https://doi.org/10.
1016/j.cose.2020.102165
12. Detken KO, Jahnke M, Kleiner C, Rohde M. Combining Network Access Control (NAC) and SIEM func-
tionality based on open source. In: 2017 9th IEEE International Conference on Intelligent Data Acquisi-
tion and Advanced Computing Systems: Technology and Applications (IDAACS). vol. 1. IEEE; 2017.
p. 300–305.
13. Bhatt S, Manadhata PK, Zomlot L. The Operational Role of Security Information and Event Manage-
ment Systems. IEEE Security & Privacy. 2014; 12(5):35–41. https://doi.org/10.1109/MSP.2014.103
14. Langner R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy. 2011; 9(3):49–51.
https://doi.org/10.1109/MSP.2011.67
15. Case DU. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and
Analysis Center (E-ISAC). 2016; 388(1-29):3.
16. Hindy H, Brosset D, Bayne E, Seeam A, Bellekens X. Improving SIEM for critical SCADA water infra-
structures using machine learning. In: International Workshop on Security and Privacy Requirements
Engineering. Springer; 2018. p. 3–19.
17. Cinque M, Cotroneo D, Pecchia A. Challenges and Directions in Security Information and Event Man-
agement (SIEM). In: 2018 IEEE International Symposium on Software Reliability Engineering Work-
shops (ISSREW); 2018. p. 95–99.
18. IBM Security X-Force threat intelligence index 2023;. https://www.ibm.com/reports/threat-intelligence/.
19. Cerullo G, Formicola V, Iamiglio P, Sgaglione L. Critical Infrastructure Protection: having SIEM technol-
ogy cope with network heterogeneity. arXiv preprint arXiv:14047563. 2014;.
20. González-Granadillo G, González-Zarzosa S, Diaz R. Security information and event management
(siem): Analysis, trends, and usage in critical infrastructures. Sensors. 2021; 21(14):4759. https://doi.
org/10.3390/s21144759 PMID: 34300500
21. Kotenko I, Chechulin A. Attack modeling and security evaluation in SIEM systems. International Trans-
actions on Systems Science and Applications. 2012; 8:129–147.
22. Casola V, De Benedictis A, Riccio A, Rivera D, Mallouli W, de Oca EM. A security monitoring system for
internet of things. Internet of Things. 2019; 7:100080. https://doi.org/10.1016/j.iot.2019.100080
23. Stergiou C, Psannis KE, Plageras AP, Kokkonis G, Ishibashi Y. Architecture for security monitoring in
IoT environments. In: 2017 IEEE 26th international symposium on industrial electronics (ISIE). IEEE;
2017. p. 1382–1385.
24. Mármol FG. BSIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things. In:
Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA,
Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings. vol. 11605.
Springer; 2019. p. 108.
25. Botello JV, Mesa AP, Rodrı́guez FA, Dı́az-López D, Nespoli P, Mármol FG. BlockSIEM: Protecting
smart city services through a blockchain-based and distributed SIEM. Sensors. 2020; 20(16):4636.
https://doi.org/10.3390/s20164636 PMID: 32824695
26. Leszczyna R, Wróbel MR. Evaluation of open source siem for situation awareness platform in the smart
grid environment. In: 2015 IEEE World Conference on Factory Communication Systems (WFCS).
IEEE; 2015. p. 1–4.
27. Overview—PRELUDE SIEM—UNITY 360;. https://www.prelude-siem.org/.
28. Open Source—Cyberoam;. https://www.cyberoam.com/iviewopensource.html.
29. Sekharan SS, Kandasamy K. Profiling SIEM tools and correlation engines for security analytics. In:
2017 International Conference on Wireless Communications, Signal Processing and Networking
(WiSPNET). IEEE; 2017. p. 717–721.
30. IBM QRadar SIEM—Overview | IBM;. https://www.ibm.com/products/qradar-siem.
31. ArcSight Security Information and Event Management: SIEM Software | Micro Focus;. https://www.
microfocus.com/en-us/products/siem-security-information-event-management/overview.
32. About Splunk Enterprise—Splunk Documentation;. https://docs.splunk.com/Documentation/Splunk/8.
1.1/Overview/AboutSplunkEnterprise.
33. SIEM Solution | Security Information & Event Management | LogRhythm;. https://logrhythm.com/
solutions/security/siem/.
34. Safarzadeh M, Gharaee H, Panahi AH. A Novel and Comprehensive Evaluation Methodology for SIEM.
In: International Conference on Information Security Practice and Experience. Springer; 2019. p. 476–
488.
35. Christopher FE, Myers KJ. Siem-Enabled Cyber Event Correlation (What And How). Defence Technical
Inforamtion Centre; 2018.
36. Kavčič L. A system for monitoring security events using open source tools. Computer Science and Infor-
matics; 2018.
37. Sepúlveda Rodrı́guez RA. Analysis of Alternatives for a Security Information and Event Management
Tool in a Virtualized Environment. Computer Science;. 2018;.
38. Mulyadi F, Annam LA, Promya R, Charnsripinyo C. Implementing Dockerized Elastic Stack for Security
Information and Event Management. In: 2020-5th International Conference on Information Technology
(InCIT). IEEE; 2020. p. 243–248.
39. Thiele A. Security Information and Event Management Systems; 2018.
40. Särkisaari T. Wazuh in SOC environment for Linux visibility enhancement; 2020.
41. Bernardo LF. Targeted Attack Detection by Means of Free and Open Source Solutions; 2018.
42. Nabil M, Soukainat S, Lakbabi A, Ghizlane O. SIEM selection criteria for an efficient contextual security.
In: 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE;
2017. p. 1–6.
43. Thakur K, Kopecky S, Nuseir M, Ali ML, Qiu M. An analysis of information security event managers. In:
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE
Computer Society; 2016. p. 210–215.
44. Info-Tech Research Group;. http://www.infotech.com/.
45. InfoTech. Optimise IT security management and simplify compliance with SIEM tools;. https://
whitepapers.theregister.com/paper/view/3535/optimise-it-security-management-and-simplify-
compliance-with-siem-tools.
46. Tech Target Security;. http://searchsecurity.techtarget.com/.
47. Pavlik J, Komarek A, Sobeslav V. Security information and event management in the cloud computing
infrastructure. In: 2014 IEEE 15th International Symposium on Computational Intelligence and Informat-
ics (CINTI); 2014. p. 209–214.
48. Mokalled H, Catelli R, Casola V, Debertol D, Meda E, Zunino R. The Guidelines to Adopt an Applicable
SIEM Solution. Journal of Information Security. 2019; 11(1):46–70. https://doi.org/10.4236/jis.2020.
111003
49. Mokalled H, Catelli R, Casola V, Debertol D, Meda E, Zunino R. The Applicability of a SIEM Solution:
Requirements and Evaluation. In: 2019 IEEE 28th International Conference on Enabling Technologies:
Infrastructure for Collaborative Enterprises (WETICE); 2019. p. 132–137.
50. Welcome to Wazuh � Wazuh 4.0 documentation;. https://documentation.wazuh.com/4.0/index.html.
51. OSSIM: The Open Source SIEM | AlienVault;. https://cybersecurity.att.com/products/ossim.
52. SIEM on the Elastic Stack | Elastic Security | Elastic SIEM;. https://www.elastic.co/siem.
53. Administering Splunk Enterprise Security—Splunk Documentation;. https://docs.splunk.com/
Documentation/ES/6.4.1/Admin/Introduction.
54. Apache Metron Big Data Security;. https://metron.apache.org/.
55. Groenewegen A, Janssen JS. The Hive Project: The maturity of an open-source Security Incident
Response platform; 2021.