Build Your Own SOC Lab

Kanakamedala Kashish*, Monika Sahu**, Neelam Sharma***, Siddhartha Choubey****
*-**** Shri Shankaracharya Technical Campus, Junwani, Bhilai, Chhattisgarh, India.
Periodicity:July - September'2024

Abstract

This initiative addresses the critical need for robust cybersecurity in the modern digital landscape. It serves as a comprehensive guide tailored for organizations and individuals seeking practical resources in digital security. Emphasizing cost-effectiveness, adaptability, and scalability, it provides detailed instructions for setting up a functional SOC lab. Covering essential components, including hardware, software tools, and network infrastructure, this guide ensures thorough preparation for tackling cybersecurity challenges. It explores various use cases, such as threat detection, incident response, and security monitoring, enabling hands-on learning in SOC operations. By enhancing stakeholders' capabilities in protecting digital assets and mitigating cyber threats, this initiative contributes to the resilience and security of modern digital ecosystems. Through practical insights and methodologies, it empowers individuals and organizations to navigate the evolving cybersecurity landscape effectively.

Keywords

SOC, Documentation, Tool, Github, Elastic, Kali, Repositories.

How to Cite this Article?

Kashish, K., Sahu, M., Sharma, N., and Choubey, S. (2024). Build Your Own SOC Lab. i-manager’s Journal on Software Engineering, 19(1), 29-34.

References

[2]. Eileraas, M., & Andreassen, J. (2022). A Dynamic Framework Enhancing Situational Awareness in Cybersecurity SOC—IR (Master's thesis, University of Agder).
[3]. Islam, M. A. (2023). Application of artificial intelligence and machine learning in security operations center. Issues in Information Systems, 24(4), 1-24.
[5]. McLaughlin, K. L. (2023). Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. CRC Press.
[6]. Morel, B. (2011, October). Artificial Intelligence and the future of cybersecurity. In Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence (pp. 93-98).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.