• Complain

Florian Skopik - Smart Log Data Analytics: Techniques for Advanced Security Analysis

Here you can read online Florian Skopik - Smart Log Data Analytics: Techniques for Advanced Security Analysis full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer Nature, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Florian Skopik Smart Log Data Analytics: Techniques for Advanced Security Analysis

Smart Log Data Analytics: Techniques for Advanced Security Analysis: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Smart Log Data Analytics: Techniques for Advanced Security Analysis" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for online use, not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.

Florian Skopik: author's other books


Who wrote Smart Log Data Analytics: Techniques for Advanced Security Analysis? Find out the surname, the name of the author of the book and a list of all author's works by series.

Smart Log Data Analytics: Techniques for Advanced Security Analysis — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Smart Log Data Analytics: Techniques for Advanced Security Analysis" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Smart Log Data Analytics Florian Skopik Markus Wurzenberger - photo 1
Book cover of Smart Log Data Analytics
Florian Skopik , Markus Wurzenberger and Max Landauer
Smart Log Data Analytics
Techniques for Advanced Security Analysis
1st ed. 2021
Logo of the publisher Florian Skopik Center for Digital Safety Security - photo 2
Logo of the publisher
Florian Skopik
Center for Digital Safety & Security, Austrian Institute of Technology, Vienna, Austria
Markus Wurzenberger
Center for Digital Safety & Security, Austrian Institute of Technology, Vienna, Austria
Max Landauer
Center for Digital Safety & Security, Austrian Institute of Technology, Vienna, Austria
ISBN 978-3-030-74449-6 e-ISBN 978-3-030-74450-2
https://doi.org/10.1007/978-3-030-74450-2
Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

Prudent event monitoring and logging are the only means that allow system operators and security teams to truly understand how complex systems are utilized. Log data are essential to detect intrusion attempts in real time or forensically work through previous incidents to create a vital understanding of what has happened in the past.

Today, almost every organization already logs data to some extent, and although it means a considerable effort to establish a secure and robust logging infrastructure as well as the governing management policies and processes, basic and raw logging is comparatively simple in contrast to log analysis. The latter is an art of its own, which not many organizations know how to master. Log data are extremely diverse and processing them is unfortunately quite complex. There is no standard that dictates the granularity, structure, and level of details that log events provide. There is no agreement what logs comprise and how they are formatted.

Facing these facts, it is astonishing that not much literature that concerns logging in computer networks exists. And although there are at least some great books out there, it is not enough. On the one side some existing literature did not age well (certain topics are simply outdated after several years as technologies evolve and newer concepts such as bring your own device, cloud computing, and IoT hit the market), and on the other side some relevant topics are simply not sufficiently covered yet, especially when it comes to complexand sometimes drylog data analytics.

We take Dr. Chuvakins (et al.) book Logging and Log Management from 2013 as a starting point. This is a great book that covers all the essential basics from a technical and management point of view, such as what log data actually are, how to collect log data, and how to perform simple analysis, and also explains filtering, normalization, and correlation as well as reporting of findings. It further elaborates on available tools and helps the practitioner to adopt state-of-the-art logging technologies quickly. However, while it provides a profound and important basis for everyone who is in charge of setting up a logging infrastructure, this book does not go far enough for certain audiences. The authors essentially stop there, where our book starts. We assume, the reader of our book knows the basics and has already collected experience with logging technologies. We further assume, the reader spent some serious thoughts on what to log, how to log and why to logand that common challenges regarding the collection of log data have been solved, including time synchronization, access control for log agents, log buffering/rotation, and consistency assurance. For all these topics, technical (and vendor-specific) documentation exists.

We pick up the reader at this point, where they ask the question what to do with the collected logs beyond simple outlier detection and static rule-based evaluations. Here, we enter new territory and provide insights into latest research results and promising approaches. We provide an outlook on what kind of log analysis is actually possible with the appropriate algorithms and provide the accompanying open-source software solution AMiner to try out cutting-edge research methods from this book on own data!

This book discusses important extensions to the state of the art. Its content is meant for academics, researchers, and graduate studentsas well as any forward-thinking practitioner interested to:
  • Learn how to parse and normalize log data in a scalable way, i.e., without inefficient linear lists of regular expressions

  • Learn how to efficiently cluster log events in real time, i.e., create clusters incrementally while log events arrive

  • Learn how to characterize systems and create behavior profiles with the use of cluster maps

  • Learn how to automatically create correlation rules from log data

  • Learn how to track system behavior trends over time

In the last decade, numerous people supported this project. We would like to specifically thank Roman Fiedler as one of the founders of the AMiner project, Wolfgang Hotwagner for the invaluable infrastructure and implementation support, Georg Hld for his contributions to the advanced detectors, and Ernst Leierzopf for software quality improvements.

Florian Skopik
Markus Wurzenberger
Max Landauer
Vienna, Austria Vienna, Austria Vienna, Austria
March 2021
Acknowledgments

This work has been financially supported by the Austrian Research Promotion Agency FFG and the European Unions FP7 and H2020 programs in course of several research projects from 2011 to 2021.

Acronyms
AD

Anomaly detection

AECID

Automatic event correlation for incident detection

ARIMA

Autoregressive integrated moving-average

CE

Cluster evolution

CPS

Cyber-physical systems

CTI

Cyber threat intelligence

DNS

Domain name system

EDR

Endpoint detection and response

HIDS

Host-based intrusion detection system

IDS
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Smart Log Data Analytics: Techniques for Advanced Security Analysis»

Look at similar books to Smart Log Data Analytics: Techniques for Advanced Security Analysis. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Smart Log Data Analytics: Techniques for Advanced Security Analysis»

Discussion, reviews of the book Smart Log Data Analytics: Techniques for Advanced Security Analysis and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.