Visible to the public Biblio

Filters: Keyword is data intensive computing  [Clear All Filters]
2017-04-24
Tall, Anne, Wang, Jun, Han, Dezhi.  2016.  Survey of Data Intensive Computing Technologies Application to to Security Log Data Management. Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies. :268–273.

Data intensive computing research and technology developments offer the potential of providing significant improvements in several security log management challenges. Approaches to address the complexity, timeliness, expense, diversity, and noise issues have been identified. These improvements are motivated by the increasingly important role of analytics. Machine learning and expert systems that incorporate attack patterns are providing greater detection insights. Finding actionable indicators requires the analysis to combine security event log data with other network data such and access control lists, making the big-data problem even bigger. Automation of threat intelligence is recognized as not complete with limited adoption of standards. With limited progress in anomaly signature detection, movement towards using expert systems has been identified as the path forward. Techniques focus on matching behaviors of attackers to patterns of abnormal activity in the network. The need to stream, parse, and analyze large volumes of small, semi-structured data files can be feasibly addressed through a variety of techniques identified by researchers. This report highlights research in key areas, including protection of the data, performance of the systems and network bandwidth utilization.