Mining Unstructured Log Messages for Security Threat Detection

نویسندگان

  • Candace Suh-Lee
  • Kathryn Hausbeck
چکیده

................................................................................................................................... iii Acknowledgments ...................................................................................................................... iv List of Tables .......................................................................................................................... viii List of Figures ............................................................................................................................ ix List of Listings ........................................................................................................................... xi Chapter

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mining Invariants from Console Logs for System Problem Detection

Detecting execution anomalies is very important to the maintenance and monitoring of large-scale distributed systems. People often use console logs that are produced by distributed systems for troubleshooting and problem diagnosis. However, manually inspecting console logs for the detection of anomalies is unfeasible due to the increasing scale and complexity of distributed systems. Therefore, ...

متن کامل

EMailAnalyzer: An E-Mail Mining Plug-in for the ProM Framework

Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “event log”, i.e., a log recording the execution of activities. Thus far, process mining has been focusing on such structured event logs resulting in powerful analysis techniques and tools for discovering process, control, ...

متن کامل

Research on Redirect Technology Based on Interest Association Rules in NAT

For lack of resources for IP address and the Network attack become diversity, the NAT technology is used for address extension. So, the requirement of Network security is improved. This paper mainly research on the security policy of NAT, and proposes Intrusion Redirect, protection of the Network effectively. Base on Apriori mining, proposes Interest association rules for the IDS Intrusion log ...

متن کامل

Big Data Analytics with Hadoop to analyze Targeted Attacks on Enterprise Data

Big Data describes data sets that are too large, to unstructured or too fast changing for analysis. Big Data analytics is the process of analyzing and mining Big Data. Due to increase in number of sophisticated targeted threats and rapid growth in data, the analysis of data becomes too difficult. Today's Big Data security analytics systems rely, on untrustworthy data. As organizations open and ...

متن کامل

Anomaly Detection from Log Files Using Data Mining Techniques

Log files are created by devices or systems in order to provide information about processes or actions that were performed. Detailed inspection of security logs can reveal potential security breaches and it can show us system weaknesses. In our work we propose a novel anomaly-based detection approach based on data mining techniques for log analysis. Our approach uses Apache Hadoop technique to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017