System log clustering approaches for cyber security applications: A survey

被引:40
|
作者
Landauer, Max [1 ]
Skopik, Florian [1 ]
Wurzenberger, Markus [1 ]
Rauber, Andreas [2 ]
机构
[1] Austrian Inst Technol, Seibersdorf, Austria
[2] Vienna Univ Technol, Vienna, Austria
基金
欧盟地平线“2020”;
关键词
Log clustering; Cyber security; Log mining; Signature extraction; Anomaly detection; ANOMALY DETECTION;
D O I
10.1016/j.cose.2020.101739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Log files give insight into the state of a computer system and enable the detection of anomalous events relevant to cyber security. However, automatically analyzing log data is difficult since it contains massive amounts of unstructured and diverse messages collected from heterogeneous sources. Therefore, several approaches that condense or summarize log data by means of clustering techniques have been proposed. Picking the right approach for a particular application domain is, however, non-trivial, since algorithms are designed towards specific objectives and requirements. This paper therefore surveys existing approaches. It thereby groups approaches by their clustering techniques, reviews their applicability and limitations, discusses trends and identifies gaps. The survey reveals that approaches usually pursue one or more of four major objectives: overview and filtering, parsing and signature extraction, static outlier detection, and sequences and dynamic anomaly detection. Finally, this paper also outlines a concept and tool that support the selection of appropriate approaches based on user-defined requirements. (C) 2020 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey
    Singh, Jaskaran
    Wazid, Mohammad
    Das, Ashok Kumar
    Chamola, Vinay
    Guizani, Mohsen
    [J]. COMPUTER COMMUNICATIONS, 2022, 192 : 316 - 331
  • [2] Deep learning algorithms for cyber security applications: A survey
    Li, Guangjun
    Sharma, Preetpal
    Pan, Lei
    Rajasegarar, Sutharshan
    Karmakar, Chandan
    Patterson, Nicholas
    [J]. JOURNAL OF COMPUTER SECURITY, 2021, 29 (05) : 447 - 471
  • [3] A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention
    Ibor, Ayei E.
    Oladeji, Florence A.
    Okunoye, Olusoji B.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (04): : 15 - 28
  • [4] A Brief Survey of Security Approaches For Cyber-Physical Systems
    Bou-Harb, Elias
    [J]. 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [5] A Survey of University System of Georgia Cyber Security Programs
    Peltsverger, Svetlana
    [J]. PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [6] A Survey of Contemporary Cyber Security Vulnerabilities and Potential Approaches to Automated Defence
    Mazzolin, Robert
    Madni, Asad
    [J]. 2020 14TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2020), 2020,
  • [7] A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat
    Zhu B.
    Guo Y.
    Guo C.
    Jiang Z.
    Zhang X.
    Yuan X.
    [J]. Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (01): : 178 - 187
  • [8] Approaches for Vehicle Cyber Security
    Onishi, Hiro
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 506 - 507
  • [9] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [10] Log Analysis of Cyber Security Training Exercises
    Abbott, Robert G.
    McClain, Jonathan
    Anderson, Benjamin
    Nauer, Kevin
    Silva, Austin
    Forsythe, Chris
    [J]. 6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 5088 - 5094