Bayyinah, A Log Analysis Forensics Tool

被引:0
|
作者
Alghfeli, Salma [1 ]
Alhadrami, Zainab [1 ]
Alghfeli, Mariam [1 ]
Albloushi, Noura [1 ]
Alfaresi, Ahmed [1 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
D O I
10.1109/aicai.2019.8701405
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As internet attacks continue to increase, organizations need a security product that can predict attacks before they occur. One way to predict such attacks is by performing a comprehensive analysis of data logs. Log files contain information that is useful to any organization for auditing, but on the other hand, logs are among the earliest data sources that specialists check when an attack occurs. It is common for log analysis to rely on queries based on relational databases which are inefficient especially as the size of stored logs is considered big data. Our framework will utilize tools for storing, indexing and querying big data. On this paper, we propose to build a data mining engine to detect abnormal/suspicious activities from the processed logs. The analysis will be easily visualized through a graphical user interface for digital forensics investigations.
引用
收藏
页码:845 / 849
页数:5
相关论文
共 50 条
  • [21] Cloud Computing Log Forensics-the New Frontier
    Thorpe, Sean
    Grandison, Tyrone
    Blake, M. Brian
    IEEE SOUTHEASTCON 2014, 2014,
  • [22] A Method to Automatically Filter Log Evidences for Intrusion Forensics
    Zhang, Jian
    Fu, Xiao
    Du, Xiaojiang
    Luo, Bin
    Zhao, Zhihong
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 39 - 44
  • [23] Android Asset Packaging Tool based Forensics Security and Predictive Analysis
    Goar, Vishal
    Sharma, Aditi
    Chahal, Deepak
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (03): : 124 - 131
  • [24] Research and Implementation of Computer Network User Behavior Forensics Analysis System Based on System Log
    Jing, He
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 458 - 461
  • [25] Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability
    Takahashi, Daisuke
    Xiao, Yang
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1474 - 1478
  • [26] Exploration and implementation of user behavior forensics analysis system of computer network based on system log
    Lu, Wenzhe
    Acta Technica CSAV (Ceskoslovensk Akademie Ved), 2017, 62 (02): : 53 - 62
  • [27] Anti-Forensics: The Next Step in Digital Forensics Tool Testing
    Wundram, Martin
    Freiling, Felix C.
    Moch, Christian
    2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 83 - 97
  • [28] Analysis of visitor's behavior from Web Log using Web Log Expert Tool
    Kumar, Manoj
    Meenu
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 296 - 301
  • [29] Blockchain-Based Log Verification System for Cloud Forensics
    AGBEDANU Promise Ricardo
    王鹏伟
    雷颖慧
    NORTEY Richard N
    RASOOL Abdul
    ODARTEY Lamptey K
    JournalofDonghuaUniversity(EnglishEdition), 2021, 38 (05) : 449 - 458
  • [30] Database memory forensics: Identifying cache patterns for log verification
    Wagner, James
    Nissan, Mahfuzul I.
    Rasin, Alexander
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 45