We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compressed file. This yields an entry identifier for each log entry that provides a pointer that can be used by indexing methods. The research also evaluates t...
The size of computing systems and the number of their components steadily increase. The volume of ge...
A Log records are very important information which is related to activities of systems, applications...
Event log processing and analysis play a key role in applica-tions ranging from security management,...
We are surrounded by an increasing number of devices and applications that produce a huge quantity o...
With the move towards global and multi-national companies, information technology infrastructure req...
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operationa...
Strong similarities exist between intrusion detection and information retrieval. This paper explore...
This report explores the field of visualisation of network and security log data, specifically the v...
As computers become larger, more powerful, and more connected, many challenges arise in implementing...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
Compression as data coding technique has seen approximately 70 years of research and practical innov...
Methodologies presently in use to perform forensic analysis of web applications are decidedly lacki...
Log files or audit logs are files that record information about events that occur on a computer syst...
We present a method to effectively detect malicious activity in the data of enterprise logs. Our met...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
The size of computing systems and the number of their components steadily increase. The volume of ge...
A Log records are very important information which is related to activities of systems, applications...
Event log processing and analysis play a key role in applica-tions ranging from security management,...
We are surrounded by an increasing number of devices and applications that produce a huge quantity o...
With the move towards global and multi-national companies, information technology infrastructure req...
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operationa...
Strong similarities exist between intrusion detection and information retrieval. This paper explore...
This report explores the field of visualisation of network and security log data, specifically the v...
As computers become larger, more powerful, and more connected, many challenges arise in implementing...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
Compression as data coding technique has seen approximately 70 years of research and practical innov...
Methodologies presently in use to perform forensic analysis of web applications are decidedly lacki...
Log files or audit logs are files that record information about events that occur on a computer syst...
We present a method to effectively detect malicious activity in the data of enterprise logs. Our met...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
The size of computing systems and the number of their components steadily increase. The volume of ge...
A Log records are very important information which is related to activities of systems, applications...
Event log processing and analysis play a key role in applica-tions ranging from security management,...