Research and Application of Firewall Log and Intrusion Detection Log Data Visualization System

被引:0
|
作者
Ma, Mingze [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, 50 Nanyang Ave, Singapore 639798, Singapore
关键词
Computer system firewalls - Data accuracy - Intrusion detection - Network security;
D O I
10.1049/2024/7060298
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper tackles current challenges in network security analysis by proposing an innovative information gain-based feature selection algorithm and leveraging visualization techniques to develop a network security log data visualization system. The system's key functions include raw data collection for firewall logs and intrusion detection logs, data preprocessing, database management, data manipulation, data logic processing, and data visualization. Through statistical analysis of log data and the construction of visualization models, the system presents analysis results in diverse graphical formats while offering interactive capabilities. Seamlessly integrating data generation, processing, analysis, and display processes, the system demonstrates high accuracy, precision, recall, F1 score, and real-time performance metrics, reaching 98.3%, 92.1%, 97.5%, 98.1%, and 91.2%, respectively, in experimental evaluations. The proposed method significantly enhances real-time prediction capabilities of network security status and monitoring efficiency of network devices, providing a robust security assurance tool.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Intrusion Detection System Based on data mining for Host Log
    Zhu, Ming
    Huang, ZiLi
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1742 - 1746
  • [2] Research and Application of Log Defect Detection and Visualization System Based on Dry Coupling Ultrasonic Method
    Yuan Y.
    Zhang D.
    Sayed U.
    Zhu H.
    Wang J.
    Yang X.
    Wang Z.
    Journal of Renewable Materials, 2023, 11 (11) : 3917 - 3932
  • [3] An Intrusion Detection System Using Apache Log Files
    Ince, Cemile
    Omac, Zeki
    2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP 2019), 2019,
  • [4] Normalisation of Log Messages for Intrusion Detection
    Sapegin, Andrey
    Jaeger, David
    Azodi, Amir
    Gawron, Marian
    Cheng, Feng
    Meinel, Christoph
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (03): : 167 - 176
  • [5] Research and Design Based on Distributed Firewall Log Server
    Lu Chang
    Xu GuangMing
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2012, 141 : 157 - 163
  • [6] Cyberattack detection model using deep learning in a network log system with data visualization
    Jung-Chun Liu
    Chao-Tung Yang
    Yu-Wei Chan
    Endah Kristiani
    Wei-Je Jiang
    The Journal of Supercomputing, 2021, 77 : 10984 - 11003
  • [7] Cyberattack detection model using deep learning in a network log system with data visualization
    Liu, Jung-Chun
    Yang, Chao-Tung
    Chan, Yu-Wei
    Kristiani, Endah
    Jiang, Wei-Je
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (10): : 10984 - 11003
  • [8] Analysis on the Application of Campus Network Firewall And Intrusion Detection System
    Wang, Jinying
    Yan, Pengfei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 398 - 401
  • [9] A Mobile Log Data Analysis System Based on Multidimensional Data Visualization
    Liang, Ting
    Cao, Yu
    Zhu, Min
    Zhou, Baoyao
    Li, Mingzhao
    Gan, Qihong
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT II, 2014, 8422 : 543 - 546
  • [10] An Online Visualization System for Streaming Log Data of Computing Clusters
    Xia, Jing
    Wu, Feiran
    Guo, Fangzhou
    Xie, Cong
    Liu, Zhen
    Chen, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (02) : 196 - 205