A Visualization Method Based on Graph Database in Security Logs Analysis

被引:2
|
作者
Tang, Xinyu [1 ,2 ]
Ma, Chunguang [1 ]
Yu, Min [2 ,3 ]
Liu, Chao [2 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Network Forensics; Log Analysis; Association rule mining; Graph Database;
D O I
10.23977/icamcs.2017.1012
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Network security logs can provide evidence for forensic investigators. However, the network logs are facing the problems of high repetition rate, high false alarm rate, uniform format and so on, which make it difficult for forensic researchers to find useful information. In this paper, the association rules mining algorithm is used to analyze the network security logs, so as to eliminate the redundant data and to find the implied association between the logs data. Then the graph database is used to visualize the log information. Forensic analysts can obtain effective evidence by observing the graph database, which can improve the efficiency of the forensic analysts to discover the sensitive event information.
引用
收藏
页码:82 / 89
页数:8
相关论文
共 50 条
  • [41] Network security risk analysis based on graph theoretical methods
    Lin, Zefu
    [J]. Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 510 - 516
  • [42] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [43] Glotto Vibrato Graph: A Device and Method for Recording, Analysis and Visualization of Glottal Activity
    Chakraborty, Kishalay
    Devi, Senjam Shantirani
    Devnath, Sanjeevan
    Prasanna, S. R. Mahadeva
    Sarmah, Priyankoo
    [J]. 19TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2018), VOLS 1-6: SPEECH RESEARCH FOR EMERGING MARKETS IN MULTILINGUAL SOCIETIES, 2018, : 2392 - 2393
  • [45] A security analysis for encrypted database
    Mingsheng, Zhang
    Chunyong, Yin
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
  • [46] Bibliometric-based Visualization Knowledge Graph Analysis of Smart Factory
    Wang Chuan
    Zhu Fuxi
    Qian Yining
    [J]. INTERNATIONAL CONFERENCE ON MECHANICAL DESIGN AND SIMULATION (MDS 2022), 2022, 12261
  • [47] Visualization and Forecast Analysis of Science and Technology Intelligence Based on Knowledge Graph
    Ji, Rui
    Yu, Shiming
    Yan, Hongwei
    Ding, Suren
    Wang, Ben
    Zong, Hui
    Zhu, Quanyin
    [J]. 2018 17TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES), 2018, : 44 - 47
  • [48] Homomorphic Encryption atWork for Private Analysis of Security Logs
    Boudguiga, Aymen
    Stan, Oana
    Sedjelmaci, Hichem
    Carpov, Sergiu
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 515 - 523
  • [49] Speeding Up Bipartite Graph Visualization Method
    Fushimi, Takayasu
    Kubota, Yamato
    Saito, Kazumi
    Kimura, Masahiro
    Ohara, Kouzou
    Motoda, Hiroshi
    [J]. AI 2011: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2011, 7106 : 697 - +
  • [50] Simulation system for fin-and-tube heat exchanger based on graph theory, database and visualization technology
    Ding, Guo-Liang
    Wu, Zhi-Gang
    Long, Hui-Fang
    Wang, Kai-Jian
    Fukaya, Masaharu
    [J]. PROCEEDINGS OF THE 3RD ASIAN CONFERENCE ON REFRIGERATION AND AIR-CONDITIONING VOLS I AND II, 2006, : 153 - +