Bayyinah, A Log Analysis Forensics Tool

被引:0
|
作者
Alghfeli, Salma [1 ]
Alhadrami, Zainab [1 ]
Alghfeli, Mariam [1 ]
Albloushi, Noura [1 ]
Alfaresi, Ahmed [1 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
D O I
10.1109/aicai.2019.8701405
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As internet attacks continue to increase, organizations need a security product that can predict attacks before they occur. One way to predict such attacks is by performing a comprehensive analysis of data logs. Log files contain information that is useful to any organization for auditing, but on the other hand, logs are among the earliest data sources that specialists check when an attack occurs. It is common for log analysis to rely on queries based on relational databases which are inefficient especially as the size of stored logs is considered big data. Our framework will utilize tools for storing, indexing and querying big data. On this paper, we propose to build a data mining engine to detect abnormal/suspicious activities from the processed logs. The analysis will be easily visualized through a graphical user interface for digital forensics investigations.
引用
收藏
页码:845 / 849
页数:5
相关论文
共 50 条
  • [1] FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool
    Aldwairi, Monther
    Alsaadi, Hesham H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [2] GRAPHJ: A Forensics Tool for Handwriting Analysis
    Guarnera, Luca
    Farinella, Giovanni Maria
    Furnari, Antonino
    Salici, Angelo
    Ciampini, Claudio
    Matranga, Vito
    Battiato, Sebastiano
    IMAGE ANALYSIS AND PROCESSING (ICIAP 2017), PT II, 2017, 10485 : 591 - 601
  • [3] MitM Tool Analysis for TLS Forensics
    Kim, Minju
    Shin, Yeonghun
    Shon, Taeshik
    2021 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2021, : 39 - 42
  • [4] Challenges of Cloud Log Forensics
    Alobaidli, Hanan
    Nasir, Qassim
    Iqbal, Asif
    Guimaraes, Mario
    PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 227 - 230
  • [5] Read the digital fingerprints: log analysis for digital forensics and security
    Kara I.
    Computer Fraud and Security, 2021, 2021 (07): : 11 - 16
  • [6] Automated Windows event log forensics
    Murphey, Rich
    DIGITAL INVESTIGATION, 2007, 4 (92-100) : S92 - S100
  • [7] Event Log Analysis with the LogCluster Tool
    Vaarandi, Risto
    Kont, Markus
    Pihelgas, Mauno
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 982 - 987
  • [8] A Dynamic Taint Analysis Tool for Android App Forensics
    Xu, Zhen
    Shi, Chen
    Cheng, Chris Chao-Chun
    Gong, Neil Zhengqiang
    Guan, Yong
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 160 - 169
  • [9] Analysis of firewall log-based detection scenarios for evidence in digital forensics
    Mukhtar, Rabiu
    Al-Nemrat, A.
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Jahankhani, Hamid
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 261 - 279
  • [10] Log Analyzer for Network Forensics and Incident Reporting
    Nehinbe, Joshua Ojo
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 356 - 361