Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India

Research Article

A Secured Log Mining Approach to Collection, Monitoring, Rotation, and Analysis of Frequent and Heterogeneous Logs

Download397 downloads
  • @INPROCEEDINGS{10.4108/eai.27-2-2020.2303252,
        author={Surendra  Gaur and Nafisur  Rahman},
        title={A Secured Log Mining Approach to Collection, Monitoring, Rotation, and Analysis of Frequent and Heterogeneous Logs},
        proceedings={Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India},
        publisher={EAI},
        proceedings_a={ICIDSSD},
        year={2021},
        month={3},
        keywords={log security mining},
        doi={10.4108/eai.27-2-2020.2303252}
    }
    
  • Surendra Gaur
    Nafisur Rahman
    Year: 2021
    A Secured Log Mining Approach to Collection, Monitoring, Rotation, and Analysis of Frequent and Heterogeneous Logs
    ICIDSSD
    EAI
    DOI: 10.4108/eai.27-2-2020.2303252
Surendra Gaur1,*, Nafisur Rahman1
  • 1: Department of Computer Science and Engineering, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi
*Contact email: surendragour@gmail.com

Abstract

Organizations tend to develop their IT infrastructure in a way that complies with Network and Information Security standards. Logs play an important role with respect to security. It is very difficult to collect the logs from various hosts in real-time and analyze these raw log messages without the help of analysis tools. In this paper, we propose a log mining approach employing Centralized log server and Analyzer tools for extracting information that matters from a huge amount of log messages and displays messages. We begin by introducing the challenges faced by the internet world and the role of logs in this connection. Then we describe the problem of extraction and making sense of logs. Then we discuss the architecture and the entire workflow of the proposed solution and the method of log collection, monitoring, rotation, and analysis. Finally, we discuss the result report sample that establishes the usefulness of our approach.