Data Cleaning Technique for Security Logs Based on Fellegi-Sunter Theory

被引:2
|
作者
Martinez-Mosquera, Diana [1 ]
Lujan-Mora, Sergio [2 ]
Lopez, Gabriel [3 ]
Santos, Lauro [4 ]
机构
[1] Univ Israel, Dept Ciencias Ingn, Quito, Ecuador
[2] Univ Alicante, Dept Software & Comp Syst, Alicante, Spain
[3] Escuela Politec Nacl, Dept Elect Telecomunicac & Redes Informac, Quito, Ecuador
[4] Nokia Solut & Networks, Performance Testing & Continuous Integrat, Amadora, Portugal
来源
INFORMATION SYSTEMS: RESEARCH, DEVELOPMENT, APPLICATIONS, EDUCATION | 2017年 / 300卷
关键词
Data; Cleaning; Big Data; Security; Fellegi-Sunter;
D O I
10.1007/978-3-319-66996-0_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is one of the most important aspects an organization should consider. Due to this matter and the variety of existing vulnerabilities, there are specialized groups known as Computer Security Incident Response Team (CSIRT), that are responsible for event monitoring and for providing proactive and reactive support related to incidents. Using as a case study a CSIRT of a university with 10,000 users, and considering the high volume of events to be analyzed on a daily basis, it is proposed to implement a Big Data ecosystem. One of the most important activities for the information processing is the data cleaning phase, it will remove useless data and help to overcome storage limitations, since CSIRT is actually limited to a small time-frame, usually a few days and cannot analyze historical security events. Focusing on this cleaning phase, this article analyzes an intuitive technique and proposes a comparative technique based on the Fellegi-Sunter theory. The main conclusion of our research is that some data could be safely ignored helping to reduce storage size requirements. Moreover, increasing the data retention will enable to detect some events from historical data.
引用
收藏
页码:3 / 12
页数:10
相关论文
共 6 条
  • [1] Data Cleaning Technique for Security Big Data Ecosystem
    Martinez-Mosquera, Diana
    Lujan-Mora, Sergio
    IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 380 - 385
  • [2] Research on Multimedia Data Information Security Algorithm Based on Chaos Theory
    Zhao J.
    Informatica (Slovenia), 2023, 47 (08): : 57 - 66
  • [3] Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique
    Alassery, Fawaz
    Alzahrani, Ahmed
    Khan, Asif Irshad
    Sharma, Kanika
    Ahmad, Masood
    Khan, Raees Ahmad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (01): : 859 - 872
  • [4] PUF based on chip comparison technique for trustworthy scan design data security against side channel attack
    Mukkath S.I.
    Devi N.M.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 201 - 223
  • [5] Optimizing data privacy and security measures for critical infrastructures via IoT based ADP2S technique
    Xu, Zhenyu
    Wang, Jinming
    Feng, Shujuan
    Othmen, Salwa
    Lhioui, Chahira
    Flah, Aymen
    Slanina, Zdenek
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [6] Increasing the data hiding capacity and improving the security of a double-random phase-encoding technique based information hiding scheme
    Sang, Jun
    Xiang, Hong
    Sang, Nong
    Fu, Li
    OPTICS COMMUNICATIONS, 2009, 282 (14) : 2713 - 2721