Survey Of Data Intensive Computing Technologies Application To To Security Log Data Management
Keywords
Data intensive computing; Hadoop; Security event log information management; Spark
Abstract
Data intensive computing research and technology developments offer the potential of providing significant improvements in several security log management challenges. Approaches to address the complexity, timeliness, expense, diversity, and noise issues have been identified. These improvements are motivated by the increasingly important role of analytics. Machine learning and expert systems that incorporate attack patterns are providing greater detection insights. Finding actionable indicators requires the analysis to combine security event log data with other network data such and access control lists, making the big-data problem even bigger. Automation of threat intelligence is recognized as not complete with limited adoption of standards. With limited progress in anomaly signature detection, movement towards using expert systems has been identified as the path forward. Techniques focus on matching behaviors of attackers to patterns of abnormal activity in the network. The need to stream, parse, and analyze large volumes of small, semistructured data files can be feasibly addressed through a variety of techniques identified by researchers. This report highlights research in key areas, including protection of the data, performance of the systems and network bandwidth utilization.
Publication Date
12-6-2016
Publication Title
Proceedings - 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2016
Number of Pages
268-273
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1145/3006299.3006336
Copyright Status
Unknown
Socpus ID
85013149260 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/85013149260
STARS Citation
Tall, Anne; Wang, Jun; and Han, Dezhi, "Survey Of Data Intensive Computing Technologies Application To To Security Log Data Management" (2016). Scopus Export 2015-2019. 4355.
https://stars.library.ucf.edu/scopus2015/4355