Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2026
License: CC BY
Data sources: ZENODO
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

An Integrated SIEM Approach for Real-Time Threat Detection and Log Analytics in Higher Education ERM Systems

Authors: Namratha KB; Shradha Hiremath; Abhiram Girish Naik; Sanjana N Patel; Sudarshana VD; Dr Prakash Kuppuswamy; Swathi A; +1 Authors

An Integrated SIEM Approach for Real-Time Threat Detection and Log Analytics in Higher Education ERM Systems

Abstract

Data related to academics, administration, and sensitive institutional information is increasingly handled by Enterprise Resource Management (ERM) systems in modern higher education institutions. Systems of this type become more vulnerable to cybersecurity threats as they grow in scale and functionality. Specifically developed for an educational institution's ERM ecosystem, this paper presents the design and implementation of a customized Security Information and Event Management (SIEM) solution. By centralizing and normalizing logs generated from student, faculty, and administrative portals, the proposed system allows real-time monitoring and analysis of system activities. A SIEM integrates rule-based mechanisms with machine learning models for detecting anomalies, unauthorized access, privilege abuse, and abnormal user behavior. A dynamic and intuitive dashboard provides administrators with immediate visibility into security events, alerts, and emerging trends derived from collected log data. Logs are processed through classification and correlation engines to create accurate, high-confidence alerts. In experiments, improvements were demonstrated in the accuracy of anomaly detection, the efficiency of logging, and the reliability of alerting. In addition to strengthening security awareness and supporting compliance and auditing, the solution provides a cost-effective, scalable framework for safeguarding academic ERM systems.

Keywords

SIEM, Enterprise Resource Management, Cybersecurity, Log Analysis, Machine Learning, Anomaly Detection

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average