Detailed Information

Cited 1 time in webofscience Cited 3 time in scopus
Metadata Downloads

A Study on the Big Data Log Analysis for Security

Full metadata record
DC Field Value Language
dc.contributor.authorJeon, Kyung-Sik-
dc.contributor.authorPark, Se-Jeong-
dc.contributor.authorChun, Sam-Hyun-
dc.contributor.authorKim, Jong-Bae-
dc.date.available2018-05-07T11:11:36Z-
dc.date.created2018-04-17-
dc.date.issued2016-01-
dc.identifier.issn1738-9976-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5565-
dc.description.abstractRecently, cyber-attack has become the serious national treat such as shut down industry control system, and an act of war. Therefore, the issue is suggested about the necessity of Enterprise Security Management (ESM) that is for integrated management of network system such as firewall, IPS, VPN, and etc. However, current ESM has the limit of blocking only cyber-attack from outside due to using the networking attack detection method that monitoring the traffic inflows from outside to inside. Therefore, this study suggests the new security log system using big data that enhances intelligence of security by analyzing the relationship between security and data events created from network, system, application service of main IT infrastructure. We assume to apply the distribution-based saving/processing technology through the security log system using big data which is suggested in the study. Moreover a ripple effect of enhanced customer service satisfaction due to the possibility of inflow and infection (spread) of malignant code in-house and real time monitoring.-
dc.language영어-
dc.language.isoen-
dc.publisherSCIENCE & ENGINEERING RESEARCH SUPPORT SOC-
dc.relation.isPartOfINTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS-
dc.titleA Study on the Big Data Log Analysis for Security-
dc.typeArticle-
dc.identifier.doi10.14257/ijsia.2016.10.1.02-
dc.type.rimsART-
dc.identifier.bibliographicCitationINTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.10, no.1, pp.13 - 20-
dc.description.journalClass1-
dc.identifier.wosid000376639500002-
dc.identifier.scopusid2-s2.0-84956855072-
dc.citation.endPage20-
dc.citation.number1-
dc.citation.startPage13-
dc.citation.titleINTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS-
dc.citation.volume10-
dc.contributor.affiliatedAuthorChun, Sam-Hyun-
dc.contributor.affiliatedAuthorKim, Jong-Bae-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.oadoiVersionpublished-
dc.subject.keywordAuthorBig Data-
dc.subject.keywordAuthorLog-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorCyber-attack-
dc.subject.keywordAuthoranalysis-
dc.description.journalRegisteredClassscopus-
Files in This Item
Go to Link
Appears in
Collections
Graduate School of Software > Major in Software > 1. Journal Articles
College of Law > Department of Law > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Jong Bae photo

Kim, Jong Bae
Presidential Organization (Startup Support Foundation)
Read more

Altmetrics

Total Views & Downloads

BROWSE