Application of business intelligence for analyzing vulnerabilities to increase the security level in an academic CSIRT

This study aimed at designing a potential solution through Business Intelligence for acquiring data and information from a wide variety of sources and utilizing them in the decision-making of the vulnerability analysis of an Academic CSIRT (Computer Security Incident Response Team). This study was d...

Full description

Bibliographic Details
Main Authors: Reyes-Mena, Francisco Xavier, Fuertes-Díaz, Walter Marcelo, Guzmán-Jaramillo, Carlos Enrique, Pérez-Estévez, Ernesto, Bernal-Barzallo, Paúl Fernando, Villacís-Silva, César Javier
Format: Online
Language:eng
Published: Universidad Pedagógica y Tecnológica de Colombia 2018
Subjects:
Online Access:https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7747
Description
Summary:This study aimed at designing a potential solution through Business Intelligence for acquiring data and information from a wide variety of sources and utilizing them in the decision-making of the vulnerability analysis of an Academic CSIRT (Computer Security Incident Response Team). This study was developed in a CSIRT that gathers a variety of Ecuadorian universities. We applied the Action-Research methodology with a qualitative approach, divided into three phases: First, we qualitatively evaluated two intrusion detection analysis tools (Passive Scanner and Snort) to verify their advantages and their ability to be exclusive or complementary; simultaneously, these tools recorded the real-time logs of the incidents in a MySQL related database. Second, we applied the Ralph Kimball's methodology to develop several routines that allowed applying the "Extract, Transform, and Load" process of the non-normalized logs that were subsequently processed by a graphical user interface. Third, we built a software application using Scrum to connect the obtained logs to the Pentaho BI tool, and thus, generate early alerts as a strategic factor. The results demonstrate the functionality of the designed solution, which generates early alerts, and consequently, increases the security level of the CSIRT members.