Analyzing Boundary Device Logs on the In-Memory Platform

被引:1
作者
Cheng, Feng [1 ]
Sapegin, Andrey [1 ]
Gawron, Marian [1 ]
Meinel, Christoph [1 ]
机构
[1] Univ Potsdam, Hasso Plattner Inst HPI, D-14482 Potsdam, Germany
来源
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS) | 2015年
关键词
D O I
10.1109/HPCC-CSS-ICESS.2015.284
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The boundary devices, such as routers, firewalls, proxies, and domain controllers, etc., are continuously generating logs showing the behaviors of the internal and external users, the working state of the network as well as the devices themselves. To rapidly and efficiently analyze these logs makes great sense in terms of security and reliability. However, it is a challenging task due to the fact that a huge amount of data might be generated for being analyzed in very short time. In this paper, we address this challenge by applying complex analytics and modern in-memory database technology on the large amount of log data. Logs from different kinds of devices are collected, normalized, and stored in the In-Memory database. Machine learning approaches are then implemented to analyze the centralized big data to identify attacks and anomalies which are not easy to be detected from the individual log event. The proposed method is implemented on the In-Memory platform, i.e., SAP HANA Platform, and the experimental results show that it has the expected capabilities as well as the high performance.
引用
收藏
页码:1367 / 1372
页数:6
相关论文
共 7 条
[1]  
[Anonymous], 2021, files
[2]  
Cardenas Alvaro A., 2013, IEEE SECUR PRIV, V11, P1540
[3]  
Chadwick D., 2004, P 8 IFIP TC 6 TC 11, P173
[4]   An alert correlation platform for memory-supported techniques [J].
Roschke, Sebastian ;
Cheng, Feng ;
Meinel, Christoph .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10) :1123-1136
[5]  
Sadoddin R., 2006, P ACM INT C PRIVACY, P1
[6]  
Sapegin A., 2015, P 14 INT S PAR DISTR
[7]  
Sapegin A., 2013, P 9 INT C INF ASS SE