Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4572
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMeena, Amit Kumaren_US
dc.contributor.authorHubballi, Neminathen_US
dc.contributor.authorSingh, Yogendraen_US
dc.contributor.authorBhatia, Vimalen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:52Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:52Z-
dc.date.issued2020-
dc.identifier.citationMeena, A. K., Hubballi, N., Singh, Y., Bhatia, V., & Franke, K. (2020). Network security systems log analysis for trends and insights: A case study. Paper presented at the International Symposium on Advanced Networks and Telecommunication Systems, ANTS, , 2020-December doi:10.1109/ANTS50601.2020.9342776en_US
dc.identifier.isbn9781728192901-
dc.identifier.issn2153-1684-
dc.identifier.otherEID(2-s2.0-85101218170)-
dc.identifier.urihttps://doi.org/10.1109/ANTS50601.2020.9342776-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4572-
dc.description.abstractNetwork perimeter security appliances like firewalls, intrusion detection systems mediate communications and log details pertaining to various events. Logs generated by these systems are used to identify security compromises, vulnerable systems, mis-configurations, etc and serve as a valuable asset for a network administrator. In this paper, we report on a study conducted using logs generated by production level security appliances deployed in our university network. In particular, we process the logs generated by firewall, intrusion detection/prevention system and domain name system service to identify trends and gain insights. We process 71 million network connection records which includes 95.7 thousand alerts generated by an open source intrusion detection system collected over a period of 31 days and derive statistics to understand end host level behavioral trends. In our analysis we compare hosts which are known to be infected with malware or running Peer-to-Peer applications and remaining using a set of relevant parameters and identify clearly differentiated behavioral trends. © 2020 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceInternational Symposium on Advanced Networks and Telecommunication Systems, ANTSen_US
dc.subjectComputer crimeen_US
dc.subjectComputer system firewallsen_US
dc.subjectIntrusion detectionen_US
dc.subjectOpen systemsen_US
dc.subjectPeer to peer networksen_US
dc.subjectDomain name systemen_US
dc.subjectIntrusion Detection Systemsen_US
dc.subjectIntrusion detection/prevention systemsen_US
dc.subjectNetwork administratoren_US
dc.subjectNetwork connectionen_US
dc.subjectPeer-to-peer applicationen_US
dc.subjectSecurity appliancesen_US
dc.subjectVulnerable systemsen_US
dc.subjectNetwork securityen_US
dc.titleNetwork Security Systems Log Analysis for Trends and Insights: A Case Studyen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: