2019
DOI: 10.1007/s11227-019-02853-2
|View full text |Cite
|
Sign up to set email alerts
|

On construction of a network log management system using ELK Stack with Ceph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…For instance, in [23], Wang K et al proposed a payload-based intrusion detection method. On the contrary, Rafał Kozik et al used the flexibility of cloud-based architecture, as well as the latest advances in the field of large-scale machine learning, for shifting computationally more expensive and demanding operations [5], [24]. Going to the cloud to conduct traffic classification effectively using edge computing capacities, based on complex ELMs (extreme learning machine models) pre-built on the cloud, can decrease the overhead efficiency on edge devices.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, in [23], Wang K et al proposed a payload-based intrusion detection method. On the contrary, Rafał Kozik et al used the flexibility of cloud-based architecture, as well as the latest advances in the field of large-scale machine learning, for shifting computationally more expensive and demanding operations [5], [24]. Going to the cloud to conduct traffic classification effectively using edge computing capacities, based on complex ELMs (extreme learning machine models) pre-built on the cloud, can decrease the overhead efficiency on edge devices.…”
Section: B Related Workmentioning
confidence: 99%
“…The benefit of NetFlow is the lightweight and fastness of the entire data packet. Such features could be ideal for extraordinary detection in a crowded network environment [5].…”
Section: Introductionmentioning
confidence: 99%
“…During the past few years, some research has already been carried out on Ceph. Nonetheless, the existing research focuses attention on the application of Ceph [7] or the performance analysis of Ceph [8]. To the best of our knowledge, there was only some research concerned formal verification of Ceph.…”
Section: Introductionmentioning
confidence: 99%
“…The logs can be stored in cloud systems for convenient management. With the management tools, it is allowed to collect, store, analyze, archive, and dispose of the log information [ 10 ]. Specific uses of the logs include device monitoring [ 11 ], user behavior analysis [ 12 ], or digital forensics [ 13 ].…”
Section: Introductionmentioning
confidence: 99%