2013 3rd IEEE International Advance Computing Conference (IACC) 2013
DOI: 10.1109/iadcc.2013.6514334
|View full text |Cite
|
Sign up to set email alerts
|

MapReduce based log file analysis for system threats and problem identification

Abstract: Log files are primary source of information for identifying the System threats and problems that occur in the System at any point of time. These threats and problem in the system can be identified by analyzing the log file and finding the patterns for possible suspicious behavior. The concern administrator can then be provided with appropriate alter or warning regarding these security threats and problems in the system, which are generated after the log files are analyzed. Based upon this alters or warnings th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
(8 reference statements)
0
2
0
1
Order By: Relevance
“…In the first group, Vernekar and Buchade (2013) propose a system and claim to provide significant improvement in response time through large log file analysis, correlation of events and generating alerts by implementing MapReduce algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the first group, Vernekar and Buchade (2013) propose a system and claim to provide significant improvement in response time through large log file analysis, correlation of events and generating alerts by implementing MapReduce algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Specifically, about Slow Rate DoS attacks, the proposed systems in [12], [13], and [14] aimed to detect those attacks but they were demonstrated to be not efficient in all scenarios but only under specific attack conditions. Talking about Apache Hadoop, the solutions in [16], [17], [18], [19], [20], [21], [22], and [23] take advantage of the ability of this tool to manage big datasets, which is generally a main requirement in case of DoS attacks and in an environment like the cloud. As an additional advantage of Apache Hadoop shown in [20], [21], and [23], it includes libraries with already implemented useful tools such as machine learning algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Προκειμένου να ανταποκρίνεται στα ιδιαίτερα χαρακτηριστικά των γράφων, επεκτείνει τα RDDs ώστε να μπορούν να αναπαρασταθούν κατευθυνόμενοι γράφοι με τιμές και ιδιότητες σε κάθε ακμή και κόμβο. [51], [52], [53], [54], [55], [56], [57], [58], [59], [60] και [61].…”
Section: Graphxunclassified