CYBER DEFENSE OF URBAN DIGITAL SYSTEMS: SCALING SIEM CORRELATION TO REDUCE INCIDENTS IN A WARTIME CITY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1066

Keywords:

urban cyber security, SIEM, SOC, incident correlation, MTTD, MTTR, municipal digital services, cyber resilience

Abstract

Modern megacities are increasingly dependent on the resilience of digital platforms and converged networks that sustain critical urban life support systems. In the context of a full-scale war, where cyberattacks are strictly synchronized with the physical destruction of energy and communication infrastructure, ensuring the continuity of municipal services requires a fundamental shift from fragmented monitoring to centralized, intelligent incident management. This article systematizes the practical experience of designing, building, and operating a city-scale Security Operations Centre (SOC) based on the Specialized Municipal Enterprise “Kyivteleservis” during the period of 2021–2024. The object of the study is the complex protection processes of the Corporate Multiservice Network (CMN) of Kyiv, which connects over 1,800 municipal institutions, spans 1,500 km of fiber-optic communication lines, and supports the “Safe City” video surveillance system (comprising over 8,000 cameras) alongside the Internet of Things (LoRaWAN) sensor network. The author provides a detailed analysis of the operational challenges resulting from the sharp increase in cyber incidents and the shifting threat landscape: from massive DDoS attacks on “Kyiv Digital” ecosystem services to sophisticated attempts at exploiting vulnerabilities in telecommunications equipment during emergency power blackouts. The primary focus of the work is on the development and implementation of a methodology for scaling correlation rules within a SIEM system. The article proposes a transition from standard signature-based detection to behavioral analysis, structured according to the five core functions of the NIST Cybersecurity Framework 2.0 (Identify – Protect – Detect – Respond – Recover). A specific mechanism for the “Contextual Enrichment” of security events is described, which involves automatically appending metadata regarding asset criticality, physical location, and responsible administrator to raw logs. This approach effectively addressed the issue of “alert fatigue,” filtering out up to 90% of false positives caused by legitimate remote user activity via VPN gateways during air raid alerts. The research results are substantiated by quantitative performance metrics of the SOC: the Mean Time to Respond (MTTR) for high-severity incidents was reduced by 30% (decreasing from 45 to 30 minutes on average), and the availability of key administrative services for citizens was maintained at a level of 99.9% even during peak load periods and kinetic attacks. The conclusions formulate practical recommendations for city digital transformation leaders regarding the prioritization of monitoring tools and the construction of a fault-tolerant cyber defense architecture under conditions of limited human and financial resources. This article will be useful for critical infrastructure cybersecurity specialists, system architects, and local government officials facing similar threats.

Downloads

Download data is not yet available.

References

National Institute of Standards and Technology. (2024). The NIST Cybersecurity Framework (CSF) 2.0 (NIST Cybersecurity White Paper). U.S. Department of Commerce. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf

Mahn, A. (2018, April 16). Identify, Protect, Detect, Respond, and Recover: The NIST Cybersecurity Framework. NIST Taking Measure Blog. https://www.nist.gov/blogs/taking-measure/identify-protect-detect-respond-and-recover-nist-cybersecurity-framework

Naserinia, V., Ekstedt, M., & Asplund, M. (2021). Cyber Resilience for Critical Infrastructure: A Systematic Literature Review. KTH Royal Institute of Technology. https://www.diva-portal.org/smash/get/diva2:1576950/FULLTEXT03.pdf

Bellini, E., Marrone, S., & Di Mauro, N. (2025). Situation awareness for cyber resilience: A review. International Journal of Critical Infrastructure Protection, 48, Article 100720. https://doi.org/10.1016/j.ijcip.2025.100755

Cybersecurity Ventures. (2024). SIEM Implementation: Strategies and Best Practices. Cybersecurity Ventures. https://cybersecurityventures.com/siem-implementation-strategies-and-best-practices/

Cymulate. (2025). SIEM Correlation Rules: Fine-Tune Detection Logic at Scale. Cymulate Glossary. https://cymulate.com/cybersecurity-glossary/siem-correlation-rules/

Redborder. (2024, September 10). How SIEM correlation rules work. Redborder Blog. https://redborder.com/how-siem-correlation-rules-work/

Subach, I. Yu., Fesokha, V. V., & Fesokha, N. O. (2019). Model proaktyvnoi intelektualnoi SIEM-systemy dlia kiberzahystu obiektiv krytychnoi infrastruktury [Model of proactive intellectual SIEM-system for cyber protection of critical infrastructure objects]. Information Technology and Security, 7(2), 209–216. https://doi.org/10.20535/2411-1031.2019.7.2.190570

Hnatiuk, S. O. (2023). Systema koreliuvannia podii ta upravlinnia intsydentamy kiberbezpeky na obiektakh krytychnoi infrastruktury [Event correlation and cyber security incident management system at critical infrastructure objects]. Cybersecurity: Education, Science, Technique, 19, 161–174. https://doi.org/10.28925/2663-4023.2023.19.176196

Piadyshev, V. H. (2022). Kiberbezpeka krytychnykh infrastruktur: zakordonnyi dosvid ta ukrainski realii [Cybersecurity of critical infrastructures: foreign experience and Ukrainian realities]. South Ukrainian Law Journal, 4(3), 229–234. https://doi.org/10.32850/sulj.2022.4.3.38

Zubok, V. Yu., Davydiuk, A. V., & Klymenko, T. M. (2023). Cybersecurity of critical infrastructure in Ukrainian legislation and in Directive (EU) 2022/2555. Electronic Modeling, 45(5), 54–66. https://doi.org/10.15407/emodel.45.05.054

Grechaninov, V., Hulak, H., Sokolov, V., Skladannyi, P., & Korshun, N. (2022). Formation of dependability and cyber protection model in information systems of situational center. In Proceedings of the 1st International Workshop on Control, Optimisation and Analytical Processing of Social Networks (COAPSN-2022) (pp. 107–117). CEUR Workshop Proceedings, Vol-3149. https://ceur-ws.org/Vol-3149/paper11.pdf

Downloads


Abstract views: 2

Published

2025-12-16

How to Cite

Chernikov, P. (2025). CYBER DEFENSE OF URBAN DIGITAL SYSTEMS: SCALING SIEM CORRELATION TO REDUCE INCIDENTS IN A WARTIME CITY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 773–780. https://doi.org/10.28925/2663-4023.2025.31.1066