Proceedings of the Knowledge Capture Conference 2017
DOI: 10.1145/3148011.3154476
|View full text |Cite
|
Sign up to set email alerts
|

Causal Connections Mining Within Security Event Logs

Abstract: Performing both security vulnerability assessment and con guration processes are heavily reliant on expert knowledge. is requirement o en results in many systems being le insecure due to a lack of analysis expertise and access to specialist resources. It has long been known that a system's event log provides historical information depicting potential security threats, as well as recording con guration activities. In this paper, a novel technique is developed that can process security event logs on a computer t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
(14 reference statements)
0
3
0
Order By: Relevance
“…To determine adjacency score between two events, this technique applies 2‐skip bi‐gram model. A similar approach is proposed by Khan et al 26 . At first, this approach detects causally related event pairs in a time series dataset of system event logs by applying association rule mining technique.…”
Section: Related Workmentioning
confidence: 99%
“…To determine adjacency score between two events, this technique applies 2‐skip bi‐gram model. A similar approach is proposed by Khan et al 26 . At first, this approach detects causally related event pairs in a time series dataset of system event logs by applying association rule mining technique.…”
Section: Related Workmentioning
confidence: 99%
“…The adjacency is determined by applying 2-skip bigram model where two events occurring with two or less events are considered adjacent. A similar approach is used in [16] to identify causal relationship between time series events extracted from computer event logs. The events have unique IDs and they may appear multiple times in the database.…”
Section: Related Workmentioning
confidence: 99%
“…Another challenge exists for users with less experience and expertise as access to expertise becomes expensive through the use of consultancy services and automation software. In some instance the event log might store information critical to the security and usability of an individual's computer, but without in-depth knowledge and expertise the user is unable to identify and interpret this information [1].…”
Section: Introductionmentioning
confidence: 99%