The analysis of log data can be extremely difficult for an administrator due to a large volume of log data with various formats from a number of different sources. It is also impossible to get a more precise view of the network security without aggregating and correlating log data generated by different defending systems and tools. The paper described is to establish an intermediate and platform-independent representation to which all security log data can be normalized to. The work presented here is only a part of an ongoing project that aims at detecting intrusions by utilizing data-mining techniques. In this paper, the log format normalized is proposed and implemented in XML format. This XML log format is not only flexible, extensible an...
Digital crimes are increasing exponentially and people with possession of even a simple digital devi...
Due to increase in occurrences of intrusion events, organizations are now moving towards implementat...
design. First layer, named the event source layer, describes sources of information that can be used...
The analysis of log data can be extremely difficult for an administrator due to a large volume of lo...
Securing e-commerce sites has become a necessity as they process critical and sensitive data to cust...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
Abstract- In current trend, most of the businesses are running through online web applications such ...
Part 5: Short PapersInternational audienceAn important technique for attack detection in complex com...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
In the present scenario, there are various kinds of intrusion alerts which are stored using differen...
Computer security is an area of ever increasing importance. Our society relies on computerised servi...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Abstract — Today’s growing number of security threats to computers and networks also increase the im...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
The topic of enhancing security in XML databases is important as it includes protecting sensitive da...
Digital crimes are increasing exponentially and people with possession of even a simple digital devi...
Due to increase in occurrences of intrusion events, organizations are now moving towards implementat...
design. First layer, named the event source layer, describes sources of information that can be used...
The analysis of log data can be extremely difficult for an administrator due to a large volume of lo...
Securing e-commerce sites has become a necessity as they process critical and sensitive data to cust...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
Abstract- In current trend, most of the businesses are running through online web applications such ...
Part 5: Short PapersInternational audienceAn important technique for attack detection in complex com...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
In the present scenario, there are various kinds of intrusion alerts which are stored using differen...
Computer security is an area of ever increasing importance. Our society relies on computerised servi...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Abstract — Today’s growing number of security threats to computers and networks also increase the im...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
The topic of enhancing security in XML databases is important as it includes protecting sensitive da...
Digital crimes are increasing exponentially and people with possession of even a simple digital devi...
Due to increase in occurrences of intrusion events, organizations are now moving towards implementat...
design. First layer, named the event source layer, describes sources of information that can be used...