Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
https://dspace.ncfu.ru/handle/123456789/32457| Название: | Designing an Intelligent SOC Framework with Azure Sentinel for Enhanced Security Incident Management |
| Авторы: | Lapin, V. G. Лапин, В. Г. |
| Ключевые слова: | Security Operations Centre (SOC);Threat detection;Azure sentinel;Cyber defence;Incident response |
| Дата публикации: | 2026 |
| Издатель: | Springer Science and Business Media Deutschland GmbH |
| Библиографическое описание: | Awasekar, D., Athavale, V. A., Lobo, L. M. R. J., Lapin, V. Designing an Intelligent SOC Framework with Azure Sentinel for Enhanced Security Incident Management // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 51 - 62. - DOI: 10.1007/978-3-032-07275-7_6 |
| Источник: | Lecture Notes in Networks and Systems |
| Краткий осмотр (реферат): | The number of breaches in security has risen to a great extent and this has become a question of concern in companies around the world. An analysis done lately illustrates the urgent need for robust cyber-security measures. Normally breaching of data has worldwide reached a cost of approximately $4.45 million as reported in 2023 which is 15% greater than the previous three years. The urgent identified need requirement for special systems for detecting threats and getting responses to incidents is seeded in this emerging pattern. Azure Sentinel which is Microsoft’s cloud-native Security Information and Event Management (SIEM), and Security Orchestration, Automation, and Response (SOAR) are used in this study to build and execute an intelligent Security Operations Center (SOC) framework. The suggested SOC architecture serves as a centralized location for real-time security incident monitoring, detection, analysis, and response. Data ingestion from various sources across on-premises and cloud environments via data connectors, alert-triggering analytic rule configuration, and notification mechanism integration through channels like Gmail and Microsoft Teams are all part of the solution. In order to decrease the mean time to respond (MTTR), the study also uses Azure Logic Apps (Sentinel Playbooks) to automate incident response. By integrating threat intelligence, the framework improves threat detection capabilities, empowering companies to proactively detect and neutralize new attacks. The results of the study demonstrate that adding Azure Sentinel to SOC procedures improves incident detection, expedites response times, and strengthens overall cyber defences. |
| URI (Унифицированный идентификатор ресурса): | https://dspace.ncfu.ru/handle/123456789/32457 |
| Располагается в коллекциях: | Статьи, проиндексированные в SCOPUS, WOS |
Файлы этого ресурса:
| Файл | Размер | Формат | |
|---|---|---|---|
| scopusresults 3839.pdf Доступ ограничен | 130.39 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.