Visualising security incidents through event aggregation


Autoria(s): Hodgett, Matthew
Data(s)

12/04/2013

Resumo

Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/59077/

Relação

http://eprints.qut.edu.au/59077/1/pub_paper_viz-thru-aggreg.pdf

Hodgett, Matthew (2013) Visualising security incidents through event aggregation. [Working Paper] (Unpublished)

Direitos

Copyright 2013 Matthew Hodgett

Fonte

School of Information Systems; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #080699 Information Systems not elsewhere classified #log correlation #event reconstruction #security
Tipo

Working Paper