Filtering events using clustering in heterogeneous security logs
Log files are rich sources of information exhibiting the actions performed during the usage of a computer system in our daily work. In this study we concentrate on parsing/isolating logs from different sources and then clustering the logs using data mining tool (Weka) to filter the unwanted entries...
| Main Authors: | Hajamydeen, Asif Iqbal, Udzir, Nur Izura, Mahmod, Ramlan, Abd Ghani, Abdul Azim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22453/ http://psasir.upm.edu.my/id/eprint/22453/1/Filtering%20events%20using%20clustering%20in%20heterogeneous%20security%20logs.pdf |
Similar Items
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
Heterogeneity XACML policy evaluation engine
by: Teo, Poh Kuang, et al.
Published: (2014)
by: Teo, Poh Kuang, et al.
Published: (2014)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Integrated approach of electrical resistivity and borehole logging to determine heterogeneous composition of waste soil.
by: Omar, Husaini, et al.
Published: (2011)
by: Omar, Husaini, et al.
Published: (2011)
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
by: Susanto, Tabita Yuni, et al.
Published: (2023)
by: Susanto, Tabita Yuni, et al.
Published: (2023)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
A proof-producing machine-code analyzer for secure information flow
by: Muthana, Abdulrahman Ahmad Abdu, et al.
Published: (2008)
by: Muthana, Abdulrahman Ahmad Abdu, et al.
Published: (2008)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Cluster-based spectrum sensing scheme in heterogeneous network
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
Cluster-based spectrum sensing scheme in heterogeneous network
by: Hasan, Mohammad Kamrul, et al.
Published: (2015)
by: Hasan, Mohammad Kamrul, et al.
Published: (2015)
The parallelization of the Keller box method on heterogeneous cluster of workstations
by: Hamzah, Norhafizah, et al.
Published: (2008)
by: Hamzah, Norhafizah, et al.
Published: (2008)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
An effective naming heterogeneity resolution for XACML policy evaluation in a distributed environment
by: Teo, Poh Kuang, et al.
Published: (2021)
by: Teo, Poh Kuang, et al.
Published: (2021)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Features selection for ids in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Similar Items
-
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019) -
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011) -
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017) -
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)