A Visualization Method Based on Graph Database in Security Logs Analysis

被引:2
|
作者
Tang, Xinyu [1 ,2 ]
Ma, Chunguang [1 ]
Yu, Min [2 ,3 ]
Liu, Chao [2 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Network Forensics; Log Analysis; Association rule mining; Graph Database;
D O I
10.23977/icamcs.2017.1012
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Network security logs can provide evidence for forensic investigators. However, the network logs are facing the problems of high repetition rate, high false alarm rate, uniform format and so on, which make it difficult for forensic researchers to find useful information. In this paper, the association rules mining algorithm is used to analyze the network security logs, so as to eliminate the redundant data and to find the implied association between the logs data. Then the graph database is used to visualize the log information. Forensic analysts can obtain effective evidence by observing the graph database, which can improve the efficiency of the forensic analysts to discover the sensitive event information.
引用
收藏
页码:82 / 89
页数:8
相关论文
共 50 条
  • [1] Research on Network Security Visualization Based on Graph Database
    Wang, Ye
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, MODELING AND SIMULATION (AMMS 2018), 2018, 305 : 164 - 167
  • [2] A survey of security visualization for computer network logs
    Zhang, Yanping
    Xiao, Yang
    Chen, Min
    Zhang, Jingyuan
    Deng, Hongmei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 404 - 421
  • [3] Graph database-based network security situation awareness data storage method
    Xiaoling Tao
    Yang Liu
    Feng Zhao
    Changsong Yang
    Yong Wang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [4] Graph database-based network security situation awareness data storage method
    Tao, Xiaoling
    Liu, Yang
    Zhao, Feng
    Yang, Changsong
    Wang, Yong
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [5] Graph Drawing for Security Visualization
    Tamassia, Roberto
    Palazzi, Bernardo
    Papamanthou, Charalampos
    [J]. GRAPH DRAWING, 2009, 5417 : 2 - 13
  • [6] Suspect Tracking Based on Call Logs Analysis and Visualization
    Longtong, Yosawee
    Narupiyakul, Lalita
    [J]. 2016 20TH INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2016,
  • [7] NViZ: An Interactive Visualization of Network Security Systems Logs
    Meena, Amit Kumar
    Hubballi, Neminath
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [8] An ontology-based method for improving the quality of process event logs using database bin logs
    Ghalibafan, Shokoufeh
    Behkamal, Behshid
    Kahani, Mohsen
    Allahbakhsh, Mohammad
    [J]. International Journal of Metadata, Semantics and Ontologies, 2020, 14 (04): : 279 - 289
  • [9] An intelligent analysis method of security and stability control strategy based on the knowledge graph
    Wen, Bo
    Li, Hengxuan
    Zhang, Junhao
    Han, Qingqing
    Ding, Zehua
    [J]. FRONTIERS IN ENERGY RESEARCH, 2023, 10
  • [10] Cyber-Physical Security Assessment and Simulation Based on Graph Database
    Wang, Di
    Guo, Qinglai
    Song, Yan
    Gao, Kunlun
    Zhou, Aihua
    [J]. 2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,