Version 1
: Received: 11 April 2018 / Approved: 11 April 2018 / Online: 11 April 2018 (08:39:02 CEST)
How to cite:
Sohn, D.; Huh, S.; Lee, T.; Kwak, J. Big Data Log-Based Correlation Analysis Profiling Auto Generation Model. Preprints2018, 2018040144. https://doi.org/10.20944/preprints201804.0144.v1
Sohn, D.; Huh, S.; Lee, T.; Kwak, J. Big Data Log-Based Correlation Analysis Profiling Auto Generation Model. Preprints 2018, 2018040144. https://doi.org/10.20944/preprints201804.0144.v1
Sohn, D.; Huh, S.; Lee, T.; Kwak, J. Big Data Log-Based Correlation Analysis Profiling Auto Generation Model. Preprints2018, 2018040144. https://doi.org/10.20944/preprints201804.0144.v1
APA Style
Sohn, D., Huh, S., Lee, T., & Kwak, J. (2018). Big Data Log-Based Correlation Analysis Profiling Auto Generation Model. Preprints. https://doi.org/10.20944/preprints201804.0144.v1
Chicago/Turabian Style
Sohn, D., Taejin Lee and Jin Kwak. 2018 "Big Data Log-Based Correlation Analysis Profiling Auto Generation Model" Preprints. https://doi.org/10.20944/preprints201804.0144.v1
Abstract
The number of SIEM introduction is increasing in order to detect threat patterns in a short period of time with a large amount of structured/unstructured data, to precisely diagnose crisis to threats, and to provide an accurate alarm to an administrator by correlating collected information. However, it is difficult to quickly recognize and handle with various attack situations using a solution equipped with complicated functions during security monitoring. In order to overcome this situation, new detection analysis process has been required, and there is an effort to increase response speed during security monitoring and to expand accurate linkage analysis technology. In this paper, reflecting these requirements, we design and propose profiling auto-generation model that can improve the efficiency and speed of attack detection for potential threats requirements. we design and propose profiling auto-generation model that can improve the efficiency and speed of attack detection for potential threats.
Keywords
big data; SIEM; correlation analysis; cyber crime profiling
Subject
Computer Science and Mathematics, Information Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.