A study on time models in graph databases for security log analysis

被引:1
|
作者
Hofer, Daniel [1 ,2 ]
Jager, Markus [3 ]
Mohamed, Aya [1 ,2 ]
Kung, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ Linz, Inst Applicat Oriented Knowledge Proc, Linz, Austria
[2] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, Linz, Austria
[3] Pro2Future GmbH, Linz, Austria
关键词
Security; Graph database; Logfile analysis; Time model representation;
D O I
10.1108/IJWIS-03-2021-0023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks. Design/methodology/approach We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files' timestamp information. In the last part, we try to improve one promising looking model. Findings We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries. Research limitations/implications Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results. Originality/value In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [21] Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases
    Hornsteiner, Markus
    Kreussel, Michael
    Steindl, Christoph
    Ebner, Fabian
    Empl, Philip
    Schoenig, Stefan
    FUTURE INTERNET, 2024, 16 (12)
  • [22] Time Independent Security Analysis for Dynamic Networks using Graphical Security Models
    Enoch, Simon Yusuf
    Hong, Jin B.
    Kim, Dong Seong
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 588 - 595
  • [23] Query execution time estimation in graph databases based on graph neural networks
    He, Zhenzhen
    Yu, Jiong
    Gu, Tiquan
    Yang, Dexian
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (04)
  • [24] Use of graph databases for static code analysis
    Dauprat, Q.
    Dorbec, P.
    Richard, G.
    Rosen, J.P.
    Ada User Journal, 2022, 43 (03): : 155 - 159
  • [25] Enhancing Time Series Analysis with GNN Graph Classification Models
    Romanova, Alex
    COMPLEX NETWORKS & THEIR APPLICATIONS XII, VOL 1, COMPLEX NETWORKS 2023, 2024, 1141 : 25 - 36
  • [26] Games, time, and probability: Graph models for system design and analysis
    Henzinger, Thomas A.
    SOFSEM 2007: THEORY AND PRACTICE OF COMPUTER SCIENCE, PROCEEDINGS, 2007, 4362 : 103 - 110
  • [27] Learning Probabilistic Relational Models with (partially structured) Graph Databases
    El Abri, Marwa
    Leray, Philippe
    Essoussi, Nadia
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 256 - 263
  • [28] Analysis of log files intersections for security enhancement
    Kowalski, Kazimierz
    Beheshti, Mohsen
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 452 - +
  • [29] Log Analysis of Cyber Security Training Exercises
    Abbott, Robert G.
    McClain, Jonathan
    Anderson, Benjamin
    Nauer, Kevin
    Silva, Austin
    Forsythe, Chris
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 5088 - 5094
  • [30] Security of Sharded NoSQL Databases: A Comparative Analysis
    Zahid, Anam
    Masood, Rahat
    Shibli, Muhammad Awais
    2014 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2014, : 1 - 8