【24h】

Analysis of Log Files Intersections for Security Enhancement

机译:分析日志文件交叉部分以增强安全性

获取原文

摘要

In this paper we discuss our research in developing general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover regular patterns of system features that describe program and user behavior. Server systems invariably write detailed activity logs whose value is useful in detecting intrusion. Unfortunately, production volumes overwhelm the capacity and manageability of traditional approach. This paper discusses the issues involving large-scale log processing that helps analyze log records. In this paper we propose to analyze intersections of log files that come from different applications and firewalls installed on one computer, and intersections resulting from log files coming from different computers. Intersections of log files are substantially smaller than full logs and consist of records that indicate abnormalities in accessing single computer or set of computers. The paper concludes with some lessons we learned in building the system.
机译:在本文中,我们讨论了在开发通用和系统的入侵防护方法方面的研究。关键思想是使用数据挖掘技术来发现描述程序和用户行为的系统功能的常规模式。服务器系统总是写入详细的活动日志,这些日志的值可用于检测入侵。不幸的是,生产量压倒了传统方法的能力和可管理性。本文讨论了涉及大规模日志处理的问题,这些问题有助于分析日志记录。在本文中,我们建议分析来自一台计算机上安装的不同应用程序和防火墙的日志文件的交集,以及来自不同计算机的日志文件所导致的交集。日志文件的交集实质上小于完整日志,并且由指示访问单台计算机或一组计算机中的异常的记录组成。本文最后总结了我们在构建系统时学到的一些经验教训。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号