Article
Version 1
Preserved in Portico This version is not peer-reviewed
Big Data Log-Based Correlation Analysis Profiling Auto Generation Model
Version 1
: Received: 11 April 2018 / Approved: 11 April 2018 / Online: 11 April 2018 (08:39:02 CEST)
How to cite: Sohn, D.; Huh, S.; Lee, T.; Kwak, J. Big Data Log-Based Correlation Analysis Profiling Auto Generation Model. Preprints 2018, 2018040144. https://doi.org/10.20944/preprints201804.0144.v1 Sohn, D.; Huh, S.; Lee, T.; Kwak, J. Big Data Log-Based Correlation Analysis Profiling Auto Generation Model. Preprints 2018, 2018040144. https://doi.org/10.20944/preprints201804.0144.v1
Abstract
The number of SIEM introduction is increasing in order to detect threat patterns in a short period of time with a large amount of structured/unstructured data, to precisely diagnose crisis to threats, and to provide an accurate alarm to an administrator by correlating collected information. However, it is difficult to quickly recognize and handle with various attack situations using a solution equipped with complicated functions during security monitoring. In order to overcome this situation, new detection analysis process has been required, and there is an effort to increase response speed during security monitoring and to expand accurate linkage analysis technology. In this paper, reflecting these requirements, we design and propose profiling auto-generation model that can improve the efficiency and speed of attack detection for potential threats requirements. we design and propose profiling auto-generation model that can improve the efficiency and speed of attack detection for potential threats.
Keywords
big data; SIEM; correlation analysis; cyber crime profiling
Subject
Computer Science and Mathematics, Information Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment