Bayyinah, A Log Analysis Forensics Tool

被引:0
|
作者
Alghfeli, Salma [1 ]
Alhadrami, Zainab [1 ]
Alghfeli, Mariam [1 ]
Albloushi, Noura [1 ]
Alfaresi, Ahmed [1 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
D O I
10.1109/aicai.2019.8701405
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As internet attacks continue to increase, organizations need a security product that can predict attacks before they occur. One way to predict such attacks is by performing a comprehensive analysis of data logs. Log files contain information that is useful to any organization for auditing, but on the other hand, logs are among the earliest data sources that specialists check when an attack occurs. It is common for log analysis to rely on queries based on relational databases which are inefficient especially as the size of stored logs is considered big data. Our framework will utilize tools for storing, indexing and querying big data. On this paper, we propose to build a data mining engine to detect abnormal/suspicious activities from the processed logs. The analysis will be easily visualized through a graphical user interface for digital forensics investigations.
引用
收藏
页码:845 / 849
页数:5
相关论文
共 50 条
  • [41] Drone Forensics: Digital Flight Log Examination Framework For Micro Drones
    Renduchintala, Ankit L. P. S.
    Albehadili, Abdulsahib
    Javaid, Ahmad Y.
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 91 - 96
  • [42] CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
    Ahsan, M. A. Manazir
    Wahab, Ainuddin Wahid Bin Abdul
    Bin Idris, Mohd Yamani Idna
    Khan, Suleman
    Bachura, Eric
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2021, 6 (02): : 184 - 196
  • [43] Towards interactive event log forensics: Detecting and quantifying timestamp imperfections
    Fischer, D. A.
    Goel, K.
    Andrews, R.
    van Dun, C. G. J.
    Wynn, M. T.
    Roeglinger, M.
    INFORMATION SYSTEMS, 2022, 109
  • [44] Towards interactive event log forensics: Detecting and quantifying timestamp imperfections
    Fischer, D.A.
    Goel, K.
    Andrews, R.
    van Dun, C.G.J.
    Wynn, M.T.
    Röglinger, M.
    Information Systems, 2022, 109
  • [45] Digital forensics cloud log unification: Implementing CADF in Apache CloudStack
    Dalezios, Nikolaos
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    Ghita, Bogdan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [46] Blind Forensics Tool Of Falsification For RAW Images
    Thi Ngoc Canh Doan
    Retraint, Florent
    Zitzmann, Cathel
    2017 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2017, : 18 - 23
  • [47] THE LOG AS A TOOL FOR RESEARCH AND THERAPY
    LEVI, JR
    SOCIAL WORK, 1981, 26 (04) : 333 - 333
  • [48] Computer forensics: The modern crime fighting tool
    Busing, ME
    Null, JD
    Forcht, KA
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2005, 46 (02) : 115 - 119
  • [49] FingFor: a Deep Learning Tool for Biometric Forensics
    Fattahi, Jaouhar
    Lakdher, Baha Eddine
    Mejri, Mohamed
    Ghayoula, Ridha
    Manai, Elyes
    Ziadia, Marwa
    2024 10TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES, CODIT 2024, 2024, : 1667 - 1672
  • [50] Falcon: A Practical Log-based Analysis Tool for Distributed Systems
    Neves, Francisco
    Machado, Nuno
    Pereira, Jose
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 534 - 541