首页> 外文会议>International Conference on Circuits, Power and Computing Technologies >Spark-Based Log Data Analysis for Reconstruction of Cybercrime Events in Cloud Environment
【24h】

Spark-Based Log Data Analysis for Reconstruction of Cybercrime Events in Cloud Environment

机译:基于火花的日志数据分析,用于重建云环境中的网络犯罪事件

获取原文

摘要

In recent times, the number of cybercrimes against cloud systems and services is rapidly growing. Although, there are numerous protection systems such as firewalls and intrusion detection and prevention system, and anti-viruses that are developed to protect cloud infrastructures and services from severe attacks, but still the risk of criminal activities exists. This lead to attract the attention of researchers and scientists around the world to digital forensic which is a science to aid law enforcement officers and digital investigator to identify, collect and analyze digital footprints or evidence which are collected from a crime scene. One of the significant sources of as a digital evidence in the cloud is log data because they frequently connect events in certain time. The process of log data forensics mitigates the investigation process by identifying the malicious behavior and reveal the hidden malicious activities. Cloud log analysis can help to reconstruct cybercrime events which occurred in the cloud. Traditional log data analysis procedures and tools can be adapted to cloud through using new fast on memory computing platforms such as Apache Spark. Spark is a general-purpose cluster-computing engine, which is very fast and reliable. This paper presents analysis approach for batch and stream log data using Apache Spark. The results show that Spark can be used as a fast platform for handling the diverse large size of log data and extract useful information that can assist digital investigators in the analysis immense amount of generated cloud log data in a given frame of time. Furthermore, the results can make provision to reconstruct and generate a timeline related to historical past sequence events occurred during a cloud crime as well as identify the malicious user's IP address, date and time, with a number of accesses.
机译:最近一个时期,针对云计算系统和服务网络犯罪的数量正在迅速增长。虽然,有许多保护系统,如防火墙,入侵检测和预防系统,反病毒的开发,以保护云基础架构和服务从严重的攻击,但还是犯罪活动的风险存在。这导致以吸引世界各地的研究人员和科学家的关注这是一门科学来辅助执法人员和数字调查查明,收集和分析这些从犯罪现场收集的数字足迹或证据数字取证。其中一个作为在云中数字证据显著源是日志数据,因为在一定的时间他们经常连接的事件。日志数据取证减轻的过程通过识别恶意行为,并揭示隐藏的恶意活动的调查过程。云日志分析可以帮助重建发生在云中的网络犯罪活动。传统的日志数据分析程序和工具可以通过使用新的快速内存计算平台,如Apache星火适应云。 Spark是通用的集群运算引擎,这是非常快速和可靠的。本文介绍了使用Apache星火批次和流日志数据分析方法。结果表明,火花可被用作用于处理的日志数据和提取有用的信息,可以帮助数字研究者在生成云日志数据的分析巨大量在给定的时间帧的不同大尺寸的快速的平台。此外,分析结果可以提供重建和产生与过去的历史序列事件时间轴中的云犯罪过程中发生以及识别恶意用户的IP地址,日期和时间,与访问次数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号