Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Report . 2025
License: CC BY
Data sources: ZENODO
ZENODO
Report . 2025
License: CC BY
Data sources: Datacite
ZENODO
Report . 2025
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

SIGMA – A Universal Detection Rule Language From Basics To SIEM Integration

Authors: Ciemski, Wojciech;

SIGMA – A Universal Detection Rule Language From Basics To SIEM Integration

Abstract

SIGMA – A Universal Detection Rule Language: From Basics To SIEM Integration v.2.2 is a comprehensive guide to understanding, writing, and operationalizing Sigma detection rules. Sigma has become the de facto standard for expressing log-based detections in a SIEM-agnostic way, enabling analysts to “write once, detect everywhere.” This publication explains the evolution of Sigma (from early YAML prototypes to the current 2.0 specification), the anatomy of Sigma rules, and practical steps to create, validate, and test detections. It covers tooling such as pySigma and sigma-cli, and shows how Sigma rules can be translated and deployed across multiple platforms including Splunk, Elastic, IBM QRadar, and Microsoft Sentinel. Advanced chapters explore performance tuning, false positive reduction, contextual correlation, enrichment strategies, and QA workflows. Real-world detection scenarios such as malicious PowerShell, credential dumping, lateral movement, and ransomware kill-chains are included, with examples of Sigma rules and their equivalents in native SIEM languages. The guide is aimed at SOC analysts, detection engineers, and threat hunters, providing both theoretical foundations and actionable techniques to build reliable, portable detections across diverse environments.

Keywords

Detection engineering, Cybersecurity, Log analysis, MITRE ATT&CK, Elastic Stack, Sigma rules, Threat hunting, MITRE ATT&CK, SOC operations, IBM QRadar, SIEM integration, Microsoft Sentinel, Threat detection, Splunk

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
Related to Research communities