A study on time models in graph databases for security log analysis

被引:1
|
作者
Hofer, Daniel [1 ,2 ]
Jager, Markus [3 ]
Mohamed, Aya [1 ,2 ]
Kung, Josef [1 ,2 ]
机构
[1] Johannes Kepler Univ Linz, Inst Applicat Oriented Knowledge Proc, Linz, Austria
[2] Johannes Kepler Univ Linz, LIT Secure & Correct Syst Lab, Linz, Austria
[3] Pro2Future GmbH, Linz, Austria
关键词
Security; Graph database; Logfile analysis; Time model representation;
D O I
10.1108/IJWIS-03-2021-0023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks. Design/methodology/approach We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files' timestamp information. In the last part, we try to improve one promising looking model. Findings We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries. Research limitations/implications Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results. Originality/value In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [41] Static analysis of navigational XPath over graph databases
    Kostylev, Egor V.
    Reutter, Juan L.
    Vrgoc, Domagoj
    INFORMATION PROCESSING LETTERS, 2016, 116 (07) : 467 - 474
  • [42] Comparative Analysis of Graph and Relational Databases using HerbMicrobeDB
    Chandrababu, Suganya
    Bastola, Dhundy R.
    2018 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS WORKSHOPS (ICHI-W), 2018, : 19 - 28
  • [43] Graph Databases: Neo4j Analysis
    Guia, Jose
    Soares, Valeria Goncalves
    Bernardino, Jorge
    ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 351 - 356
  • [44] SECURITY LEVEL ASSIGNMENT BY GRAPH ANALYSIS
    ARAKI, T
    MORIZUMI, T
    NAGASE, H
    TAKENAKA, T
    YAMASHITA, K
    IEICE TRANSACTIONS ON COMMUNICATIONS ELECTRONICS INFORMATION AND SYSTEMS, 1991, 74 (08): : 2166 - 2175
  • [45] Graph Models in Tracking Behaviors for Cyber-Security
    Cybenko, George
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 3 - 6
  • [46] Towards Semantic Network Models via Graph Databases for SDN Applications
    Cypriano de Souza, Talita de Paula
    Rothenberg, Christian Esteve
    Silva Santos, Mateus Augusto
    de Paula, Luciano Bernardes
    2015 FOURTH EUROPEAN WORKSHOP ON SOFTWARE DEFINED NETWORKS - EWSDN 2015, 2015, : 49 - 54
  • [47] A Comparative Analysis of Array Models for Databases
    Baumann, Peter
    Holsten, Soenke
    DATABASE THEORY AND APPLICATION, BIO-SCIENCE AND BIO-TECHNOLOGY, 2011, 258 : 80 - 89
  • [48] ANALYSIS OF EMISSION DATABASES FOR REGIONAL MODELS
    MIDDLETON, P
    ATMOSPHERIC ENVIRONMENT, 1987, 21 (07) : 1497 - 1509
  • [49] Security log time synchronization for high-availability systems
    Naedele, M
    INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 199 - 206
  • [50] A comparative analysis of array models for databases
    Baumann, Peter
    Holsten, Sönke
    International Journal of Database Theory and Application, 2012, 5 (01): : 89 - 120