Log Analysis System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 29415 Experts worldwide ranked by ideXlab platform

Zhongwei Chen - One of the best experts on this subject based on the ideXlab platform.

  • intelligent Log Analysis System for massive and multi source security Logs mmslas design and implementation plan
    Mobile Ad-hoc and Sensor Networks, 2019
    Co-Authors: Yizhen Sun, Shaoming Guo, Zhongwei Chen
    Abstract:

    In the Internet of Things and industrial controlnetwork servers, a large number of Logs will be formed everymoment. This Log information, as an important basis for eventrecording and security auditing, provides important informa-tion for identifying threat sources, identifying threat degreeand judging threat impact. However, the current security LogAnalysis System usually only standardizes the Logs separately, and lacks the correlation Analysis of the information fromvarious sources. Thus, this paper presents an intelligent LogAnalysis System for massive and multi-source security Logs-MMSLAS(Massive and Multi-Source Security Log AnalysisSystem). In the Log Analysis module, the System integratesbusiness rule Analysis and behavior Analysis and additionallyadopts a machine learning-based Analysis method, which fullyexploits the correlation between security Logs and realizes thecomprehensive Analysis of multi-source security Logs. At thesame time, the distributed architecture scheme is also sufficientto cope with the System load caused by a large amount ofdata. The final implementation results show that MMSLAScan quickly locate the improper behavior in the Log, and detectthe abnormal requests in advance according to the Analysis ofthe behavior trajectory.

  • MSN - Intelligent Log Analysis System for Massive and Multi-Source Security Logs: MMSLAS Design and Implementation Plan
    2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2019
    Co-Authors: Yizhen Sun, Shaoming Guo, Zhongwei Chen
    Abstract:

    In the Internet of Things and industrial controlnetwork servers, a large number of Logs will be formed everymoment. This Log information, as an important basis for eventrecording and security auditing, provides important informa-tion for identifying threat sources, identifying threat degreeand judging threat impact. However, the current security LogAnalysis System usually only standardizes the Logs separately, and lacks the correlation Analysis of the information fromvarious sources. Thus, this paper presents an intelligent LogAnalysis System for massive and multi-source security Logs-MMSLAS(Massive and Multi-Source Security Log AnalysisSystem). In the Log Analysis module, the System integratesbusiness rule Analysis and behavior Analysis and additionallyadopts a machine learning-based Analysis method, which fullyexploits the correlation between security Logs and realizes thecomprehensive Analysis of multi-source security Logs. At thesame time, the distributed architecture scheme is also sufficientto cope with the System load caused by a large amount ofdata. The final implementation results show that MMSLAScan quickly locate the improper behavior in the Log, and detectthe abnormal requests in advance according to the Analysis ofthe behavior trajectory.

Yuangang Yao - One of the best experts on this subject based on the ideXlab platform.

  • Network Security Log Analysis System Based on ELK
    DEStech Transactions on Computer Science and Engineering, 2017
    Co-Authors: Heng Zeng, Jianyi Liu, Ru Zhang, Yuan-kun Chen, Yuangang Yao
    Abstract:

    In view of the increasingly prominent problem of network space security, the management and Analysis of network security Log is a very important defense means in the security field. Aiming at the practical problems of network security Log management Analysis System, with the Log management and Analysis System as the main object of the research, combined with the problems of Log System and the current research status of Log Analysis algorithm, this paper designs the management and Analysis System of network security Log based on ELK, used to manage and analyze large amounts of Logs. The results show that the proposed method enhances the System's functions of crawling and analyzing, especially the Log retrieval ability, and combines with the large data storage technoLogy, improving the performance of the whole System.

Li Jing-chuan - One of the best experts on this subject based on the ideXlab platform.

  • Analysis and Design of Web Application Log Analysis System
    Computers & Security, 2011
    Co-Authors: Li Jing-chuan
    Abstract:

    The flourishing Development of Internet provides various conveniences on our life,study and work.Meanwhile it also brings crisis on internet safety.Application Log Analysis,as an important information safeguard,effectively makes up the loss of traditional safeguard technoLogy.This essay mainly analyses normal methods of traditional Log Analysis,and base on this,put up a new method of reading Log and Pattern matching algorithm.After test,it is been proved,these improvement have positive effect on increasing the efficiency of Log Analysis.

Yizhen Sun - One of the best experts on this subject based on the ideXlab platform.

  • intelligent Log Analysis System for massive and multi source security Logs mmslas design and implementation plan
    Mobile Ad-hoc and Sensor Networks, 2019
    Co-Authors: Yizhen Sun, Shaoming Guo, Zhongwei Chen
    Abstract:

    In the Internet of Things and industrial controlnetwork servers, a large number of Logs will be formed everymoment. This Log information, as an important basis for eventrecording and security auditing, provides important informa-tion for identifying threat sources, identifying threat degreeand judging threat impact. However, the current security LogAnalysis System usually only standardizes the Logs separately, and lacks the correlation Analysis of the information fromvarious sources. Thus, this paper presents an intelligent LogAnalysis System for massive and multi-source security Logs-MMSLAS(Massive and Multi-Source Security Log AnalysisSystem). In the Log Analysis module, the System integratesbusiness rule Analysis and behavior Analysis and additionallyadopts a machine learning-based Analysis method, which fullyexploits the correlation between security Logs and realizes thecomprehensive Analysis of multi-source security Logs. At thesame time, the distributed architecture scheme is also sufficientto cope with the System load caused by a large amount ofdata. The final implementation results show that MMSLAScan quickly locate the improper behavior in the Log, and detectthe abnormal requests in advance according to the Analysis ofthe behavior trajectory.

  • MSN - Intelligent Log Analysis System for Massive and Multi-Source Security Logs: MMSLAS Design and Implementation Plan
    2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2019
    Co-Authors: Yizhen Sun, Shaoming Guo, Zhongwei Chen
    Abstract:

    In the Internet of Things and industrial controlnetwork servers, a large number of Logs will be formed everymoment. This Log information, as an important basis for eventrecording and security auditing, provides important informa-tion for identifying threat sources, identifying threat degreeand judging threat impact. However, the current security LogAnalysis System usually only standardizes the Logs separately, and lacks the correlation Analysis of the information fromvarious sources. Thus, this paper presents an intelligent LogAnalysis System for massive and multi-source security Logs-MMSLAS(Massive and Multi-Source Security Log AnalysisSystem). In the Log Analysis module, the System integratesbusiness rule Analysis and behavior Analysis and additionallyadopts a machine learning-based Analysis method, which fullyexploits the correlation between security Logs and realizes thecomprehensive Analysis of multi-source security Logs. At thesame time, the distributed architecture scheme is also sufficientto cope with the System load caused by a large amount ofdata. The final implementation results show that MMSLAScan quickly locate the improper behavior in the Log, and detectthe abnormal requests in advance according to the Analysis ofthe behavior trajectory.

Heng Zeng - One of the best experts on this subject based on the ideXlab platform.

  • Network Security Log Analysis System Based on ELK
    DEStech Transactions on Computer Science and Engineering, 2017
    Co-Authors: Heng Zeng, Jianyi Liu, Ru Zhang, Yuan-kun Chen, Yuangang Yao
    Abstract:

    In view of the increasingly prominent problem of network space security, the management and Analysis of network security Log is a very important defense means in the security field. Aiming at the practical problems of network security Log management Analysis System, with the Log management and Analysis System as the main object of the research, combined with the problems of Log System and the current research status of Log Analysis algorithm, this paper designs the management and Analysis System of network security Log based on ELK, used to manage and analyze large amounts of Logs. The results show that the proposed method enhances the System's functions of crawling and analyzing, especially the Log retrieval ability, and combines with the large data storage technoLogy, improving the performance of the whole System.