Affiliation:
1. School of Cyber Studies, The University of Tulsa, Tulsa, OK 74104, USA
Abstract
The continuous integration of automated tools into security operation centers (SOCs) increases the volume of alerts for security analysts. This amplifies the risk of automation bias and complacency to the point that security analysts have reported missing, ignoring, and not acting upon critical alerts. Enhancing the SOC environment has predominantly been researched from a technical standpoint, failing to consider the socio-technical elements adequately. However, our research fills this gap and provides practical insights for optimizing processes in SOCs. The synergy between security analysts and automation can potentially augment threat detection and response capabilities, ensuring a more robust defense if effective human-automation collaboration is established. A scoping review of 599 articles from four databases led to a final selection of 49 articles. Thematic analysis resulted in 609 coding references generated across four main themes: SOC automation challenges, automation application areas, implications on analysts, and human factor sentiment. Our findings emphasize the extent to which automation can be implemented across the incident response lifecycle. The SOC Automation Matrix represents our primary contribution to achieving a mutually beneficial relationship between analyst and machine. This matrix describes the properties of four distinct human-automation combinations. This is of practical value to SOCs striving to optimize their processes, as our matrix mentions socio-technical system characteristics for automated tools.
Reference73 articles.
1. DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency;Chiba;IEEE Access,2022
2. Husák, M., and Čermák, M. (2022). SoK: Applications and Challenges of Using Recommender Systems in Cybersecurity Incident Handling and Response. ARES ’22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna Austria, 23–26 August 2022, Association for Computing Machinery.
3. Coro Cybersecurity (2024, January 12). 2024 SME Security Workload Impact Report; Coro Cybersecurity. 2023; pp. 1–11. Available online: https://www.coro.net/sme-security-workload-impact-report.
4. Individual Differences in Monitoring Failures of Automation;Singh;J. Gen. Psychol.,1993
5. Does Automation Bias Decision-Making?;Skitka;Int. J. Hum.-Comput. Stud.,1999
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献