Mining event logs with SLCT and LogHound

被引:42
|
作者
Vaarandi, Risto [1 ]
机构
[1] Cooperat Cyber Def Ctr Excellence, Tallinn, Estonia
关键词
event log analysis; data security; data mining;
D O I
10.1109/NOMS.2008.4575281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growth of communication networks, event logs are increasing in size at a fast rate. Today, it is not uncommon to have systems that generate tens of gigabytes of log data per day. Log data are likely to contain information that deserves closer attention - such as security events - but the task of reviewing logs manually is beyond the capabilities of a human. This paper discusses data mining tools SLCT and LogHound that were designed for assisting system management personnel in extracting knowledge from event logs.
引用
收藏
页码:1071 / 1074
页数:4
相关论文
共 50 条
  • [21] Mining Business Process Stages from Event Logs
    Hoang Nguyen
    Dumas, Marlon
    ter Hofstede, Arthur H. M.
    La Rosa, Marcello
    Maggi, Fabrizio Maria
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2017), 2017, 10253 : 577 - 594
  • [22] Mining variable fragments from process event logs
    Pourmasoumi, Asef
    Kahani, Mohsen
    Bagheri, Ebrahim
    [J]. INFORMATION SYSTEMS FRONTIERS, 2017, 19 (06) : 1423 - 1443
  • [23] Mining cost-effective patterns in event logs
    Fournier-Viger, Philippe
    Li, Jiaxuan
    Lin, Jerry Chun-Wei
    Tin Truong Chi
    Kiran, R. Uday
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 191
  • [24] Mining Conditional Partial Order Graphs from Event Logs
    Mokhov, Andrey
    Carmona, Josep
    Beaumont, Jonathan
    [J]. TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XI, 2016, 9930 : 114 - 136
  • [25] Workflow mining: Discovering process models from event logs
    van der Aalst, W
    Weijters, T
    Maruster, L
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (09) : 1128 - 1142
  • [26] Mining Timing Constraints from Event Logs for Process Model
    Zhang, Zhenyu
    Guo, Chunhui
    Ren, Shangping
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1011 - 1016
  • [27] A data clustering algorithm for mining patterns from event logs
    Vaarandi, R
    [J]. PROCEEDINGS OF THE 3RD IEEE WORKSHOP ON IP OPERATIONS & MANAGEMENT (IPOM2003), 2003, : 119 - 126
  • [28] LogCluster - A Data Clustering and Pattern Mining Algorithm for Event Logs
    Vaarandi, Risto
    Pihelgas, Mauno
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2015, : 1 - 7
  • [29] Internet Usage Patterns Mining from Firewall Event Logs
    Polpinij, Jantima
    Namee, Khanista
    [J]. 2019 INTERNATIONAL CONFERENCE ON BIG DATA AND EDUCATION (ICBDE 2019), 2019, : 93 - 97
  • [30] Repairing Event Logs to Enhance the Performance of a Process Mining Model
    Shahzadi, Shabnam
    Fang, Xianwen
    Shahzad, Usman
    Ahmad, Ishfaq
    Benedict, Troon
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022