Abstract:
Computer system log analysis should proactively support information security decisions of all types. These security decisions will likely include whether to update config...Show MoreMetadata
Abstract:
Computer system log analysis should proactively support information security decisions of all types. These security decisions will likely include whether to update configurations, close ports, block access, patch systems, maneuver the system elements, or to do nothing because the risk is acceptable. In a world with Big Data, and a heterogeneous, distributed enterprise, log analysis can be difficult at best. There is so much data from a multitude of logs (e.g. event, application, and security) within the enterprise. On top of that, enterprises have varying configurations based on hardware, software, current patch level, and operating systems. Logs must track all of this data on all of these devices. The authors suggest that semantic technologies hold one key to providing a capability for proactive, and more meaningful, log analysis.
Date of Conference: 10-12 December 2012
Date Added to IEEE Xplore: 11 March 2013
ISBN Information:
Conference Location: London, UK
No metrics found for this document.
No metrics found for this document.