2021 International Symposium on Electrical, Electronics and Information Engineering 2021
DOI: 10.1145/3459104.3459135
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics Investigation in Virtual Data Centers Using ELK

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The ELK Stack was also used by the authors in [13,14] for the analysis of massive log records and the identification of malicious behavior. Specifically, the work in [13] implemented a logstash massive data processing pipeline to collect a critical mass of logs, whereas [14] generated Sysmon logging events. In both cases, the ELK stack was utilized for log file iteration and the identification of malicious patterns.…”
Section: Related Workmentioning
confidence: 99%
“…The ELK Stack was also used by the authors in [13,14] for the analysis of massive log records and the identification of malicious behavior. Specifically, the work in [13] implemented a logstash massive data processing pipeline to collect a critical mass of logs, whereas [14] generated Sysmon logging events. In both cases, the ELK stack was utilized for log file iteration and the identification of malicious patterns.…”
Section: Related Workmentioning
confidence: 99%
“…The ELK Stack was also used by the authors in [13,14] for the analysis of massive log records and the identification of malicious behaviour. Specifically, the work in [13] implemented a logstash massive data processing pipeline to collect a critical mass of logs, whereas [14] generated Sysmon logging events. In both cases, the ELK stack was utilised for log file's iteration and identification of malicious patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Login activity is tracked and outlined through a graph of interrelated logins among the implicated hosts to conclude in the detection of anomalies among logins referring to LM. Network forensics investigation in virtual data centers using ELK [13] 2021…”
mentioning
confidence: 99%