Cybersecurity management through logging analytics

1Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To make cybersecurity efforts proactive rather than solely reactive, this work proposes using machine learning to process large network related data: We collect various performance metrics in a network and use machine learning techniques to identify anomalous behavior. We introduce the novel idea of using weighted trust to prevent corruption of classifiers. Our design combines all aspects of a log management system into one distributed application for a data center to effectively offer logging, aggregation, monitoring and intelligence services. For this, we employ a three-component log management system: (1) to actively extract metrics from machines, (2) to aggregate and analyze extracted metrics to detect anomalous behavior, and (3) to allow reviewing collected metrics and to report on anomalous behavior observed. Our system runs at network and application layers and is concerned with risk mitigation and assessment. Several machine learning techniques are compared w.r.t. their classification, as well as detection performances.

Cite

CITATION STYLE

APA

Muggler, M., Eshwarappav, R., & Cankaya, E. C. (2018). Cybersecurity management through logging analytics. In Advances in Intelligent Systems and Computing (Vol. 593, pp. 3–15). Springer Verlag. https://doi.org/10.1007/978-3-319-60585-2_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free