2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering 2010
DOI: 10.1109/sadfe.2010.10
|View full text |Cite
|
Sign up to set email alerts
|

Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development

Abstract: Today's growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and more a daily business. Further, the manual log analysis is essentially in the context of developing signatures for intrusion detection systems (IDS), which allow for an automated defense against security attacks or incidents. But the analysis of log data in the context of forens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Another approach to simplify event log analysis is visualization via graphs (Schmerl et al, 2010). This method builds virtual audit data spaces and constructs interactive 3D visualization based on quantitative analysis of event interrelations.…”
Section: Graph-based Log Visualizationmentioning
confidence: 99%
“…Another approach to simplify event log analysis is visualization via graphs (Schmerl et al, 2010). This method builds virtual audit data spaces and constructs interactive 3D visualization based on quantitative analysis of event interrelations.…”
Section: Graph-based Log Visualizationmentioning
confidence: 99%
“…Sebastin Schmerl, Michael Vogel, Rene Rietz and Hartmut Konig [22] show how it is easier to analyze logging data with visualization. Because even if a potential attack is discovered within three minutes, 50.000 logging events needed to be analysed by hand on a normal Webserver.…”
Section: F Visualization Of Logging Datamentioning
confidence: 99%
“…As an each individual today maintains more than one email account, is a member of many communities, virtual groups, takes active part in chat rooms and other networking sites with his/her identity or under an alias, juggles multiple flash drives and other digital storage media [1] [2]. The concept of the crowd sourced forensic investigation via the construction of a simple process model presents a simple model for crowd sourced digital forensics, and discussed various technique utilized in such forensic investigations [6]. In cyber forensics Network forensics is used in the case of network security.…”
Section: Introductionmentioning
confidence: 99%