Visualising security incidents through event aggregation
Data(s) |
12/04/2013
|
---|---|
Resumo |
Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph. |
Formato |
application/pdf |
Identificador | |
Relação |
http://eprints.qut.edu.au/59077/1/pub_paper_viz-thru-aggreg.pdf Hodgett, Matthew (2013) Visualising security incidents through event aggregation. [Working Paper] (Unpublished) |
Direitos |
Copyright 2013 Matthew Hodgett |
Fonte |
School of Information Systems; Information Security Institute; Science & Engineering Faculty |
Palavras-Chave | #080303 Computer System Security #080699 Information Systems not elsewhere classified #log correlation #event reconstruction #security |
Tipo |
Working Paper |