Visible to the public Biblio

Filters: Keyword is Event logging  [Clear All Filters]
2018-02-06
Cinque, M., Corte, R. D., Pecchia, A..  2017.  Entropy-Based Security Analytics: Measurements from a Critical Information System. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :379–390.

Critical information systems strongly rely on event logging techniques to collect data, such as housekeeping/error events, execution traces and dumps of variables, into unstructured text logs. Event logs are the primary source to gain actionable intelligence from production systems. In spite of the recognized importance, system/application logs remain quite underutilized in security analytics when compared to conventional and structured data sources, such as audit traces, network flows and intrusion detection logs. This paper proposes a method to measure the occurrence of interesting activity (i.e., entries that should be followed up by analysts) within textual and heterogeneous runtime log streams. We use an entropy-based approach, which makes no assumptions on the structure of underlying log entries. Measurements have been done in a real-world Air Traffic Control information system through a data analytics framework. Experiments suggest that our entropy-based method represents a valuable complement to security analytics solutions.