A Study on the Big Data Log Analysis for Security
- Authors
- Jeon, Kyung-Sik; Park, Se-Jeong; Chun, Sam-Hyun; Kim, Jong-Bae
- Issue Date
- Jan-2016
- Publisher
- SCIENCE & ENGINEERING RESEARCH SUPPORT SOC
- Keywords
- Big Data; Log; Security; Cyber-attack; analysis
- Citation
- INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.10, no.1, pp.13 - 20
- Journal Title
- INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS
- Volume
- 10
- Number
- 1
- Start Page
- 13
- End Page
- 20
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5565
- DOI
- 10.14257/ijsia.2016.10.1.02
- ISSN
- 1738-9976
- Abstract
- Recently, cyber-attack has become the serious national treat such as shut down industry control system, and an act of war. Therefore, the issue is suggested about the necessity of Enterprise Security Management (ESM) that is for integrated management of network system such as firewall, IPS, VPN, and etc. However, current ESM has the limit of blocking only cyber-attack from outside due to using the networking attack detection method that monitoring the traffic inflows from outside to inside. Therefore, this study suggests the new security log system using big data that enhances intelligence of security by analyzing the relationship between security and data events created from network, system, application service of main IT infrastructure. We assume to apply the distribution-based saving/processing technology through the security log system using big data which is suggested in the study. Moreover a ripple effect of enhanced customer service satisfaction due to the possibility of inflow and infection (spread) of malignant code in-house and real time monitoring.
- Files in This Item
-
Go to Link
- Appears in
Collections - Graduate School of Software > Major in Software > 1. Journal Articles
- College of Law > Department of Law > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.