Research and Application of Firewall Log and Intrusion Detection Log Data Visualization System

被引:0
|
作者
Ma, Mingze [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, 50 Nanyang Ave, Singapore 639798, Singapore
关键词
Computer system firewalls - Data accuracy - Intrusion detection - Network security;
D O I
10.1049/2024/7060298
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper tackles current challenges in network security analysis by proposing an innovative information gain-based feature selection algorithm and leveraging visualization techniques to develop a network security log data visualization system. The system's key functions include raw data collection for firewall logs and intrusion detection logs, data preprocessing, database management, data manipulation, data logic processing, and data visualization. Through statistical analysis of log data and the construction of visualization models, the system presents analysis results in diverse graphical formats while offering interactive capabilities. Seamlessly integrating data generation, processing, analysis, and display processes, the system demonstrates high accuracy, precision, recall, F1 score, and real-time performance metrics, reaching 98.3%, 92.1%, 97.5%, 98.1%, and 91.2%, respectively, in experimental evaluations. The proposed method significantly enhances real-time prediction capabilities of network security status and monitoring efficiency of network devices, providing a robust security assurance tool.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Performance Evaluation of Anomaly Detection in Imbalanced System Log Data
    Studiawan, Hudan
    Sohel, Ferdous
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 239 - 246
  • [32] Malware Detection System Based on API Log Data Mining
    Fan, Chun-I
    Hsiao, Han-Wei
    Chou, Chun-Han
    Tseng, Yi-Fan
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 255 - 260
  • [33] Exploration and Visualization Approach for Outlier Detection on Log Files
    Louhi, Ibrahim
    Boudjeloud-Assala, Lydia
    Tamisier, Thomas
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 3 - 12
  • [34] Histogram Matrix: Log file visualization for anomaly detection
    Frei, Adrian
    Rennhard, Marc
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 610 - +
  • [35] Visualization of Server Log Data for Detecting Abnormal Behaviour
    Suman, Reeta
    Far, Behrouz
    Mohammed, Emad A.
    Nair, Ashok
    Janbakhsh, Sanaz
    2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, : 244 - 247
  • [36] Analysis of firewall log-based detection scenarios for evidence in digital forensics
    Mukhtar, Rabiu
    Al-Nemrat, A.
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Jahankhani, Hamid
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 261 - 279
  • [37] Research on log Gabor wavelet and its application in image edge detection
    Xiao, ZT
    Guo, CM
    Yu, M
    Li, Q
    2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 592 - 595
  • [38] Log Visualization of Intrusion and Prevention Reverse Proxy Server Against Web Attacks
    Mantoro, Teddy
    Aziz, Normaziah Binti Abdul
    Yusoff, Nur Dalilah Binti Meor
    Talib, Nor Aishah Binti Abu
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 325 - 329
  • [39] Visualization System for Log Analysis with Probabilities of Incorrect Operation
    Nishioka, Chifumi
    Kozaki, Masahiro
    Okada, Ken-ichi
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 929 - 934
  • [40] Log transformation: application and interpretation in biomedical research
    Feng, Changyong
    Wang, Hongyue
    Lu, Naiji
    Tu, Xin M.
    STATISTICS IN MEDICINE, 2013, 32 (02) : 230 - 239