{"title":"使用实时日志流分析识别网络威胁","authors":"Mukesh Yadav, Dhirendra S. Mishra","doi":"10.1109/PCEMS58491.2023.10136070","DOIUrl":null,"url":null,"abstract":"The field of information security has covered various sectors in order to secure data which is stored online, offline, and during transmission over the network. The standard process of system log analysis is to first parse unstructured logs into structured data, and then apply data mining and machine learning techniques to analyze the data and build a threat detection model. This paper proposes a novel idea for identifying the network threat in an organisation. We take live network device logs in different log formats as input and send them for analysis. Whether a live log contains an anomaly, any vulnerability, or any insider threat will be identified. To find suspicious activity in the network, the logs will be processed, and find any activity at the same time.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identification of network threats using live log stream analysis\",\"authors\":\"Mukesh Yadav, Dhirendra S. Mishra\",\"doi\":\"10.1109/PCEMS58491.2023.10136070\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The field of information security has covered various sectors in order to secure data which is stored online, offline, and during transmission over the network. The standard process of system log analysis is to first parse unstructured logs into structured data, and then apply data mining and machine learning techniques to analyze the data and build a threat detection model. This paper proposes a novel idea for identifying the network threat in an organisation. We take live network device logs in different log formats as input and send them for analysis. Whether a live log contains an anomaly, any vulnerability, or any insider threat will be identified. To find suspicious activity in the network, the logs will be processed, and find any activity at the same time.\",\"PeriodicalId\":330870,\"journal\":{\"name\":\"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)\",\"volume\":\"136 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PCEMS58491.2023.10136070\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCEMS58491.2023.10136070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification of network threats using live log stream analysis
The field of information security has covered various sectors in order to secure data which is stored online, offline, and during transmission over the network. The standard process of system log analysis is to first parse unstructured logs into structured data, and then apply data mining and machine learning techniques to analyze the data and build a threat detection model. This paper proposes a novel idea for identifying the network threat in an organisation. We take live network device logs in different log formats as input and send them for analysis. Whether a live log contains an anomaly, any vulnerability, or any insider threat will be identified. To find suspicious activity in the network, the logs will be processed, and find any activity at the same time.