A study on time models in graph databases for security log analysis

被引:1
|
作者
Hofer, Daniel [1 ,2 ]
Jager, Markus [3 ]
Mohamed, Aya [1 ,2 ]
Kung, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ Linz, Inst Applicat Oriented Knowledge Proc, Linz, Austria
[2] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, Linz, Austria
[3] Pro2Future GmbH, Linz, Austria
关键词
Security; Graph database; Logfile analysis; Time model representation;
D O I
10.1108/IJWIS-03-2021-0023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks. Design/methodology/approach We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files' timestamp information. In the last part, we try to improve one promising looking model. Findings We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries. Research limitations/implications Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results. Originality/value In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [31] Supporting XML security models using relational databases: A vision
    Lee, D
    Lee, WC
    Liu, P
    DATABASE AND XML TECHNOLOGIES, 2003, 2824 : 267 - 281
  • [32] Study on the Security of the Databases in Cloud Computing Environment
    Gele, Aori
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 473 - 476
  • [33] Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
    Rodriguez, Aitor Corchero
    de los Mozos, Mario Reyes
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS 2010, 2010, 85 : 125 - 133
  • [34] Scalable Time-Versioning Support for Property Graph Databases
    Vijitbenjaronk, Warut D.
    Lee, Jinho
    Suzumura, Toyotaro
    Tanase, Gabriel
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 1580 - 1589
  • [35] The Methodology of Extraction and Analysis of Event Log Social Graph
    Soboleva, Alexandra
    Tushkanova, Olga
    PROCEEDINGS OF THE 26TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2020, : 415 - 422
  • [36] Graph Structures and Algorithms for Query-Log Analysis
    Donato, Debora
    PROGRAMS, PROOFS, PROCESSES, 2010, 6158 : 126 - 131
  • [37] Visibility graph analysis of web server log files
    Sulaimany, Sadegh
    Mafakheri, Aso
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 611
  • [38] ANALYSIS OF LOG-LINEAR MODELS
    GOKHALE, DV
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 1972, 34 (03) : 371 - 376
  • [39] Comparative Analysis of Relational and Graph Databases for Social Networks
    Almabdy, Soad
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [40] The Suitability of Graph Databases for Big Data Analysis: A Benchmark
    Macak, Martin
    Stovcik, Matus
    Buhnova, Barbora
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2020, : 213 - 220