2017 13th IEEE Conference on Automation Science and Engineering (CASE) 2017
DOI: 10.1109/coase.2017.8256257
|View full text |Cite
|
Sign up to set email alerts
|

Big-data analysis of multi-source logs for anomaly detection on network-based system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…The idea of using system log information for security auditing was first introduced by James P. Anderson in 1980 [14], and it was not until 1995 that the first practical network security vulnerability auditing software, SATAN, was released, but SATAN is technically demanding and very inconvenient to use [15]. In recent years, many tools have emerged in this area, but most are system user-based audit tools, such as SCE (Security Configuration Editor) in Windows NT 5.0 or the audit tools that come with Unix, which has limited ability to audit security events in the entire network.…”
Section: Current Developments In Audit Technologymentioning
confidence: 99%
“…The idea of using system log information for security auditing was first introduced by James P. Anderson in 1980 [14], and it was not until 1995 that the first practical network security vulnerability auditing software, SATAN, was released, but SATAN is technically demanding and very inconvenient to use [15]. In recent years, many tools have emerged in this area, but most are system user-based audit tools, such as SCE (Security Configuration Editor) in Windows NT 5.0 or the audit tools that come with Unix, which has limited ability to audit security events in the entire network.…”
Section: Current Developments In Audit Technologymentioning
confidence: 99%
“…to be devised in order to analyze this heterogeneous and multi-sourced data [35]. Analysis of such big data enables us to effectively keep track of occurred events, identify similarities from incidents, deploy resources and make quick decisions accordingly [36].…”
Section: Introductionmentioning
confidence: 99%
“…These classifiers were applied to the network log records to identify different types of network activity and detect any anomalies or suspicious behavior. Jia et al [16] proposed a data security platform based on Spark, which is designed to identify abnormal network behavior. The platform utilizes Spark's distributed computing capabilities to analyze large volumes of network data in real time and identify any suspicious activity.…”
Section: Literature Reviewmentioning
confidence: 99%