A study on time models in graph databases for security log analysis

被引:1
|
作者
Hofer, Daniel [1 ,2 ]
Jager, Markus [3 ]
Mohamed, Aya [1 ,2 ]
Kung, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ Linz, Inst Applicat Oriented Knowledge Proc, Linz, Austria
[2] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, Linz, Austria
[3] Pro2Future GmbH, Linz, Austria
关键词
Security; Graph database; Logfile analysis; Time model representation;
D O I
10.1108/IJWIS-03-2021-0023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks. Design/methodology/approach We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files' timestamp information. In the last part, we try to improve one promising looking model. Findings We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries. Research limitations/implications Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results. Originality/value In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [1] VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis
    Kurniawan, Kabul
    Ekelhart, Andreas
    Kiesling, Elmar
    Winkler, Dietmar
    Quirchmayr, Gerald
    Tjoa, A. Min
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2022, 4 (02): : 316 - 349
  • [2] Benchmarking Large Language Models for Log Analysis, Security, and Interpretation
    Karlsen, Egil
    Luo, Xiao
    Zincir-Heywood, Nur
    Heywood, Malcolm
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (03)
  • [3] Graph Databases for Contact Analysis in Infections Using Spatial Temporal Models
    Pujante, Lorena
    Campos, Manuel
    Juarez, Jose M.
    Canovas-Segura, Bernardo
    Morales, Antonio
    BIOINFORMATICS AND BIOMEDICAL ENGINEERING (IWBBIO 2020), 2020, 12108 : 98 - 107
  • [4] A Study on the Big Data Log Analysis for Security y
    Jeon, Kyung-Sik
    Park, Se-Jeong
    Chun, Sam-Hyun
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 13 - 20
  • [5] Modeling XACML Security Policies Using Graph Databases
    Paniagua Diez, Fidel
    Vasu, Amrutha Chikkanayakanahalli
    Suarez Touceda, Diego
    Sierra Camara, Jose Maria
    IT PROFESSIONAL, 2017, 19 (06) : 52 - 57
  • [7] SECURITY IN DATABASES - COMBINATORIAL STUDY
    REISS, SP
    JOURNAL OF THE ACM, 1979, 26 (01) : 45 - 57
  • [8] TAXONOMY OF TIME MODELS IN DATABASES
    LING, DHO
    BELL, DA
    INFORMATION AND SOFTWARE TECHNOLOGY, 1990, 32 (03) : 215 - 224
  • [9] A Security Model for Access Control in Graph-Oriented Databases
    Morgado, Claudia
    Baioco, Gisele Busichia
    Basso, Tania
    Moraes, Regina
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 135 - 142
  • [10] Graph Databases for Complex Network Analysis
    Liu C.
    Li S.
    Hu H.
    Fang S.
    Data Analysis and Knowledge Discovery, 2022, 6 (07): : 1 - 11