Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk

M. Selvaganesh, P. Naveen Karthi, V. A. Nitish Kumar, S. R. Prashanna Moorthy
{"title":"Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk","authors":"M. Selvaganesh, P. Naveen Karthi, V. A. Nitish Kumar, S. R. Prashanna Moorthy","doi":"10.1109/ICEARS53579.2022.9752323","DOIUrl":null,"url":null,"abstract":"A brute force is a Hacking methodology used to decrypt login passwords, keys and credentials. Hacks that exploit vulnerabilities in packages are rare, whereas Brute Force attacks aim to be the simplest, cheapest, and most straightforward approach to access a website. Using Splunk to analyse massive amounts of data could be very beneficial. The application enables to capture, search, and analyse log information in real-time. By analysing logs as well as many different sources of system information, security events can be uncovered. A log file, which details the events that have occurred in the environment of the application and the server on which they run, is a valuable piece of information. Identifying the attacks against these systems is possible by analysing and correlating this information. Massive amounts of ambiguous and amorphous information can be analysed with its superior resolution. The paper includes instructions on setting up a Splunk server and routing information there from multiple sources. Practical search examples and pre-built add-on applications are provided. Splunk is a powerful tool that allows users to explore big data with greater ease. Seizure can be tracked in near real-time and can be searched through logs. A short amount of time can be spent on analysing big data using map-reduce technology. Briefly, it helps to analyse unstructured log data to better understand how the applications operate. With Splunk, client can detect patterns in the data through a powerful query language. It is easy to set up alerts and warnings based on the queries, which will help alert client about an ongoing (suspected) activity and generate a notification in real-time.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9752323","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A brute force is a Hacking methodology used to decrypt login passwords, keys and credentials. Hacks that exploit vulnerabilities in packages are rare, whereas Brute Force attacks aim to be the simplest, cheapest, and most straightforward approach to access a website. Using Splunk to analyse massive amounts of data could be very beneficial. The application enables to capture, search, and analyse log information in real-time. By analysing logs as well as many different sources of system information, security events can be uncovered. A log file, which details the events that have occurred in the environment of the application and the server on which they run, is a valuable piece of information. Identifying the attacks against these systems is possible by analysing and correlating this information. Massive amounts of ambiguous and amorphous information can be analysed with its superior resolution. The paper includes instructions on setting up a Splunk server and routing information there from multiple sources. Practical search examples and pre-built add-on applications are provided. Splunk is a powerful tool that allows users to explore big data with greater ease. Seizure can be tracked in near real-time and can be searched through logs. A short amount of time can be spent on analysing big data using map-reduce technology. Briefly, it helps to analyse unstructured log data to better understand how the applications operate. With Splunk, client can detect patterns in the data through a powerful query language. It is easy to set up alerts and warnings based on the queries, which will help alert client about an ongoing (suspected) activity and generate a notification in real-time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用Splunk的索引集群架构的高效暴力处理方法
暴力破解是一种用于解密登录密码、密钥和凭证的黑客方法。利用软件包漏洞的黑客很少,而暴力攻击的目标是最简单、最便宜、最直接的访问网站的方法。使用Splunk分析大量数据可能是非常有益的。该应用程序能够实时捕获、搜索和分析日志信息。通过分析日志以及许多不同的系统信息源,可以发现安全事件。日志文件详细记录了在应用程序环境和运行这些应用程序的服务器中发生的事件,这是非常有价值的信息。通过分析和关联这些信息,可以识别针对这些系统的攻击。大量的模糊和无定形的信息可以分析其优越的分辨率。本文包括如何设置Splunk服务器和从多个来源路由信息的说明。提供了实际的搜索示例和预构建的附加应用程序。Splunk是一个强大的工具,允许用户更轻松地探索大数据。可以近乎实时地跟踪扣押情况,并可以通过日志进行搜索。使用map-reduce技术可以花很短的时间来分析大数据。简而言之,它有助于分析非结构化日志数据,以便更好地理解应用程序的运行方式。使用Splunk,客户端可以通过强大的查询语言检测数据中的模式。基于查询设置警报和警告很容易,这将有助于提醒客户端正在进行的(可疑的)活动并实时生成通知。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Solar Tracker Using Micro-controller "Core Strength" of Dance Lala Training Considering the Body Motion Tracking Video and Predictive Model Textile Antenna –Structure, Material and Applications Automated Classification of Atherosclerosis in Coronary Computed Tomography Angiography Images Based on Radiomics Study Using Automatic Machine Learning Cryptocurrency Exchange Rate Prediction using ARIMA Model on Real Time Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1