Skip to main content

Analysis of Logs by Using Logstash

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 516))

Abstract

The key functionality of this proposed system is its ability to handle, collect and analysis huge volume of different kinds of log data. When deployed in a network would facilitate collection of logs from different nodes across the network. This paper explains the proposed system which collects the logs using Logstash which is having a capability of handling the many types of Logs data which helps to identify the malicious activity in the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. The Foundation for Federal Security and Compliance “Log Management”. http://www.mcafee.com

  2. Dr. Anton Chauvin, The wide guide to log and event management. Int. J. Future Comput. Commun. (2013)

    Google Scholar 

  3. V. Vianello, V. Gulisano, Ricardo, A scalable SIEM systems and applications, in International Conference on Availability, Reliability and Security (2013)

    Google Scholar 

  4. Mahmoud Awad, D.A. Menasce, Logging system for automatic process, in Computer Measurement Group Conference, Sanantonio, TX, Nov 2015

    Google Scholar 

  5. Bernard Jasen, Log analysis by semantic search. Elsevier Inf. Res. (2015)

    Google Scholar 

  6. Sudeheendra, Suhas, Mitesh Patel, Pratik Kumar, On the predictive properties of performance models derived through input-output relationships, in Proceeding of 32nd International Computer Measurement Group Conference (2006)

    Google Scholar 

  7. R. Vaarandi, M. Pihelgas, Using security logs for collecting and reporting technical matrix. IEEE Trans. (2014)

    Google Scholar 

  8. T.M. Vaarandi, Imagining event log clusters, in 2015 11th International Conference Network and Service management (CNSM)

    Google Scholar 

  9. David Swift, Security Log Management Policies for Appraisal and Compliance. SAAN Institute Infosec Reading Room, Nov 2010

    Google Scholar 

  10. Afsaneh Madanis, Classification of security operation centers. IEEE Trans. (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sushma Sanjappa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Sanjappa, S., Ahmed, M. (2017). Analysis of Logs by Using Logstash. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_61

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3156-4_61

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3155-7

  • Online ISBN: 978-981-10-3156-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics