Research and Application of Firewall Log and Intrusion Detection Log Data Visualization System

被引:0
|
作者
Ma, Mingze [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, 50 Nanyang Ave, Singapore 639798, Singapore
关键词
Computer system firewalls - Data accuracy - Intrusion detection - Network security;
D O I
10.1049/2024/7060298
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper tackles current challenges in network security analysis by proposing an innovative information gain-based feature selection algorithm and leveraging visualization techniques to develop a network security log data visualization system. The system's key functions include raw data collection for firewall logs and intrusion detection logs, data preprocessing, database management, data manipulation, data logic processing, and data visualization. Through statistical analysis of log data and the construction of visualization models, the system presents analysis results in diverse graphical formats while offering interactive capabilities. Seamlessly integrating data generation, processing, analysis, and display processes, the system demonstrates high accuracy, precision, recall, F1 score, and real-time performance metrics, reaching 98.3%, 92.1%, 97.5%, 98.1%, and 91.2%, respectively, in experimental evaluations. The proposed method significantly enhances real-time prediction capabilities of network security status and monitoring efficiency of network devices, providing a robust security assurance tool.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Maintainable Log Datasets for Evaluation of Intrusion Detection Systems
    Landauer, Max
    Skopik, Florian
    Frank, Maximilian
    Hotwagner, Wolfgang
    Wurzenberger, Markus
    Rauber, Andreas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3466 - 3482
  • [22] Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning
    Shih, Wen-Chung
    Yang, Chao-Tung
    Jiang, Cheng-Tian
    Kristiani, Endah
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 4983 - 5012
  • [23] Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning
    Wen-Chung Shih
    Chao-Tung Yang
    Cheng-Tian Jiang
    Endah Kristiani
    The Journal of Supercomputing, 2023, 79 : 4983 - 5012
  • [24] Classification of Firewall Log Data Using Multiclass Machine Learning Models
    Aljabri, Malak
    Alahmadi, Amal A.
    Mohammad, Rami Mustafa A.
    Aboulnour, Menna
    Alomari, Dorieh M.
    Almotiri, Sultan H.
    ELECTRONICS, 2022, 11 (12)
  • [25] Firewall-based intrusion detection system
    Li, X.
    Zhao, H.
    Ma, S.
    2001, Northeastern University (22):
  • [26] A mechanism of intrusion detection system cooperating with firewall
    Cao, Zijian
    Rong, Xiaofeng
    Cao, Z., 2013, Asian Network for Scientific Information (12) : 6449 - 6454
  • [27] Robust Log-Based Anomaly Detection on Unstable Log Data
    Zhang, Xu
    Xu, Yong
    Lin, Qingwei
    Qiao, Bo
    Zhang, Hongyu
    Dang, Yingnong
    Xie, Chunyu
    Yang, Xinsheng
    Cheng, Qian
    Li, Ze
    Chen, Junjie
    He, Xiaoting
    Yao, Randolph
    Lou, Jian-Guang
    Chintalapati, Murali
    Shen, Furao
    Zhang, Dongmei
    ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 807 - 817
  • [28] A framework for detecting causes of system faults based on system log and application log
    Obana M.
    Hanakawa N.
    Computer Software, 2021, 38 (03) : 58 - 74
  • [29] AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
    Landauer, Max
    Wurzenberger, Markus
    Skopik, Florian
    Hotwagner, Wolfgang
    Hoeld, Georg
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [30] Research on data mining to system log audit information in IDS
    Jiang, Yichuan
    Tian, Shengfeng
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):