Insider Threat Detection Using Log Analysis and Event Correlation



Download 0,58 Mb.
Pdf ko'rish
bet9/10
Sana01.07.2022
Hajmi0,58 Mb.
#725554
1   2   3   4   5   6   7   8   9   10
Bog'liq
ambre2015

X:
Axis represents ip and 
Y:
Axis represents no of events (both positive 
and failed) 
Fig. 9. Graph of auth log 
Addition of one more technique into event correlation makes it more hybrid. By using random matrix theory, we can
 
correlate events from different ip’s to detect a DDOS kind of attack. Also 
we can obtain the time difference between 
those ip events, which can again provide useful information. Figure 10 shows the result with reference to the 
equations defined in previous section 4.4.


444

 Amruta Ambre and Narendra Shekokar / Procedia Computer Science 45 ( 2015 ) 436 – 445 
Fig. 10. Calculated probability 
Figure 9 shows graph with two event correlation techniques where as Figure 11 shows graph with three event 
correlation techniques together. This graph also consists of two axis.
X:
Axis represents ip and 
Y:
Axis represents 
seconds 
Fig. 11. New graph with three techniques 
Figure 12 indicates how many startup events and shutdown events have occurred on server and ICMP request on ip 
172.24.0.221.Based on equtions defined in section 4.4, probability of startup and shutdown has been calculated. 
 


445
 Amruta Ambre and Narendra Shekokar / Procedia Computer Science 45 ( 2015 ) 436 – 445 
Fig. 12. Syslog output
7.
 
Conclusion 
A log file monitor is a valuable tool which provides information about the probability of malicious activity .Current 
work represents structured method for detecting insider activities using log files. This is ongoing detection 
process.In the near term; research will work towards detecting insider activities from different networking devices 
along with which prevention approach should also be incorporated. 

Download 0,58 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish