ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Cybersecurity and Information Management

ISSN
Online: 2690-6775 Print: 2769-7851
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Journal of Cybersecurity and Information Management
Full Length Article

Volume 15Issue 1PP: 244-250 • 2025

Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring

Wasan Saad Ahmed 1* ,
Ziyad Tariq Mustafa AL-Ta’I 1
1Computer Science Department, College of Science, University of Diyala, Diyala, Iraq
* Corresponding Author.
Received: April 13, 2024 Revised: June 11, 2024 Accepted: August 03, 2024

Abstract

In today’s rapidly evolving digital landscape and interconnected, organizations are increasingly dependent on cloud -based infrastructure, which introduces significant cybersecurity challenges due to escalating cyber threats and attacks. To effectively manage these threats, a central monitoring system is essential. Security Information and Event Management (SIEM) solution address these issues by providing real-time monitoring and analysis of security events. This research investigates the efficiency of the Wazuh SIEM system in monitoring AWS cloud services, EC2 instance, and File integrity. Wazuh automates the collection, centralization, and analysis of security events. This approach enables the detection of unauthorized activities, monitoring of file integrity, and collection of user activity logs in real-time. This study evaluates Wazuh SIEM's capabilities by executing different types of attacks in an AWS cloud environment. The result was that it generated 1774 security alert within one week. The findings demonstrate that Wazuh SIEM provides comprehensive security monitoring and threat detection, offering significant advantages for organizations security that utilize cloud services.

Keywords

Cloud Computing Cloud Monitoring Wazuh Network security Security Information

References

[1]       Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258. https://doi.org/10.59543/ijmscs.v2i.10377

[2]       “Cloud Computing Statistics (How Many Companies Use Cloud Computing?) - Colorlib.” Accessed: Feb. 27, 2024. [Online]. Available: https://colorlib.com/wp/cloud-computing-statistics/

[3]       “Ransomware attacks worldwide by country 2022 | Statista.” Accessed: Feb. 27, 2024. [Online]. Available: https://www.statista.com/statistics/1246438/ransomware-attacks-by-country/

[4]       “Global cybercrime estimated cost 2028 | Statista.” Accessed: Feb. 27, 2024. [Online]. Available: https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide

[5]       “Cybercrime To Cost The World $10.5 Trillion Annually By 2025.” Accessed: Feb. 27, 2024. [Online]. Available: https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/

[6]       C. M. Gutierrez and W. Jeffrey, “FIPS PUB 200 Minimum Security Requirements for Federal Information and Information Systems,” 2006.

[7]       “Amazon Data Breaches: Full Timeline Through 2023.” Accessed: Feb. 28, 2024. [Online]. Available: https://firewalltimes.com/amazon-data-breach-timeline/

[8]       “Access control list (ACL) overview - Amazon Simple Storage Service.” Accessed: Mar. 20, 2024. [Online]. Available: https://docs.aws.amazon.com/AmazonS3/latest/userguide/acl-overview.html

[9]       “Components - Getting started with Wazuh · Wazuh documentation.” Accessed: May 03, 2024. [Online]. Available: https://documentation.wazuh.com/current/getting-started/components/index.html

[10]     P. Kumar Verma Ram Manohar, A. Choudhary, P. Kumar Verma, and P. Rai, “A walkthrough of Amazon Elastic Compute Cloud (Amazon EC2): A Review,” vol. 9, 2021, doi: 10.22214/ijraset.2021.38764.

[11]     “Command and Scripting Interpreter: Windows Command Shell, Sub-technique T1059.003 - Enterprise | MITRE ATT&CK®.” Accessed: Jul. 11, 2024. [Online]. Available: https://attack.mitre.org/techniques/T1059/003/

[12]     “Welcome to MITRE Caldera’s documentation! — caldera documentation.” Accessed: Jul. 11, 2024. [Online]. Available: https://caldera.readthedocs.io/en/latest/

[13]     “hydra | Kali Linux Tools.” Accessed: Jul. 11, 2024. [Online]. Available: https://www.kali.org/tools/hydra/

[14]     “Privilege Escalation, Tactic TA0004 - Enterprise | MITRE ATT&CK®.” Accessed: Jul. 11, 2024. [Online]. Available: https://attack.mitre.org/tactics/TA0004/

Cite This Article

Choose your preferred format

format_quote
Ahmed, Wasan Saad, AL-Ta’I, Ziyad Tariq Mustafa. "Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring." Journal of Cybersecurity and Information Management, vol. Volume 15, no. Issue 1, 2025, pp. 244-250. DOI: https://doi.org/10.54216/JCIM.150119
Ahmed, W., AL-Ta’I, Z. (2025). Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring. Journal of Cybersecurity and Information Management, Volume 15(Issue 1), 244-250. DOI: https://doi.org/10.54216/JCIM.150119
Ahmed, Wasan Saad, AL-Ta’I, Ziyad Tariq Mustafa. "Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring." Journal of Cybersecurity and Information Management Volume 15, no. Issue 1 (2025): 244-250. DOI: https://doi.org/10.54216/JCIM.150119
Ahmed, W., AL-Ta’I, Z. (2025) 'Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring', Journal of Cybersecurity and Information Management, Volume 15(Issue 1), pp. 244-250. DOI: https://doi.org/10.54216/JCIM.150119
Ahmed W, AL-Ta’I Z. Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring. Journal of Cybersecurity and Information Management. 2025;Volume 15(Issue 1):244-250. DOI: https://doi.org/10.54216/JCIM.150119
W. Ahmed, Z. AL-Ta’I, "Analysis of Wazuh SIEM's Effectiveness in Cloud Security Monitoring," Journal of Cybersecurity and Information Management, vol. Volume 15, no. Issue 1, pp. 244-250, 2025. DOI: https://doi.org/10.54216/JCIM.150119
Digital Archive Ready