A Study on the Big Data Log Analysis for Security
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeon, Kyung-Sik | - |
dc.contributor.author | Park, Se-Jeong | - |
dc.contributor.author | Chun, Sam-Hyun | - |
dc.contributor.author | Kim, Jong-Bae | - |
dc.date.available | 2018-05-07T11:11:36Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2016-01 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5565 | - |
dc.description.abstract | Recently, cyber-attack has become the serious national treat such as shut down industry control system, and an act of war. Therefore, the issue is suggested about the necessity of Enterprise Security Management (ESM) that is for integrated management of network system such as firewall, IPS, VPN, and etc. However, current ESM has the limit of blocking only cyber-attack from outside due to using the networking attack detection method that monitoring the traffic inflows from outside to inside. Therefore, this study suggests the new security log system using big data that enhances intelligence of security by analyzing the relationship between security and data events created from network, system, application service of main IT infrastructure. We assume to apply the distribution-based saving/processing technology through the security log system using big data which is suggested in the study. Moreover a ripple effect of enhanced customer service satisfaction due to the possibility of inflow and infection (spread) of malignant code in-house and real time monitoring. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SCIENCE & ENGINEERING RESEARCH SUPPORT SOC | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | - |
dc.title | A Study on the Big Data Log Analysis for Security | - |
dc.type | Article | - |
dc.identifier.doi | 10.14257/ijsia.2016.10.1.02 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.10, no.1, pp.13 - 20 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000376639500002 | - |
dc.identifier.scopusid | 2-s2.0-84956855072 | - |
dc.citation.endPage | 20 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 13 | - |
dc.citation.title | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | - |
dc.citation.volume | 10 | - |
dc.contributor.affiliatedAuthor | Chun, Sam-Hyun | - |
dc.contributor.affiliatedAuthor | Kim, Jong-Bae | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.oadoiVersion | published | - |
dc.subject.keywordAuthor | Big Data | - |
dc.subject.keywordAuthor | Log | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Cyber-attack | - |
dc.subject.keywordAuthor | analysis | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.