Filtering events using clustering in heterogeneous security logs
Log files are rich sources of information exhibiting the actions performed during the usage of a computer system in our daily work. In this study we concentrate on parsing/isolating logs from different sources and then clustering the logs using data mining tool (Weka) to filter the unwanted entries...
Saved in:
Main Authors: | Hajamydeen, Asif Iqbal, Udzir, Nur Izura, Mahmod, Ramlan, Abd Ghani, Abdul Azim |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Network for Scientific Information
2011
|
Online Access: | http://psasir.upm.edu.my/id/eprint/22453/1/Filtering%20events%20using%20clustering%20in%20heterogeneous%20security%20logs.pdf http://psasir.upm.edu.my/id/eprint/22453/ http://scialert.net/abstract/?doi=itj.2011.798.806 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019) -
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011) -
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017) -
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)