Abstract
The key functionality of this proposed system is its ability to handle, collect and analysis huge volume of different kinds of log data. When deployed in a network would facilitate collection of logs from different nodes across the network. This paper explains the proposed system which collects the logs using Logstash which is having a capability of handling the many types of Logs data which helps to identify the malicious activity in the network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
The Foundation for Federal Security and Compliance “Log Management”. http://www.mcafee.com
Dr. Anton Chauvin, The wide guide to log and event management. Int. J. Future Comput. Commun. (2013)
V. Vianello, V. Gulisano, Ricardo, A scalable SIEM systems and applications, in International Conference on Availability, Reliability and Security (2013)
Mahmoud Awad, D.A. Menasce, Logging system for automatic process, in Computer Measurement Group Conference, Sanantonio, TX, Nov 2015
Bernard Jasen, Log analysis by semantic search. Elsevier Inf. Res. (2015)
Sudeheendra, Suhas, Mitesh Patel, Pratik Kumar, On the predictive properties of performance models derived through input-output relationships, in Proceeding of 32nd International Computer Measurement Group Conference (2006)
R. Vaarandi, M. Pihelgas, Using security logs for collecting and reporting technical matrix. IEEE Trans. (2014)
T.M. Vaarandi, Imagining event log clusters, in 2015 11th International Conference Network and Service management (CNSM)
David Swift, Security Log Management Policies for Appraisal and Compliance. SAAN Institute Infosec Reading Room, Nov 2010
Afsaneh Madanis, Classification of security operation centers. IEEE Trans. (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sanjappa, S., Ahmed, M. (2017). Analysis of Logs by Using Logstash. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_61
Download citation
DOI: https://doi.org/10.1007/978-981-10-3156-4_61
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3155-7
Online ISBN: 978-981-10-3156-4
eBook Packages: EngineeringEngineering (R0)