Research Article
A Secured Log Mining Approach to Collection, Monitoring, Rotation, and Analysis of Frequent and Heterogeneous Logs
@INPROCEEDINGS{10.4108/eai.27-2-2020.2303252, author={Surendra Gaur and Nafisur Rahman}, title={A Secured Log Mining Approach to Collection, Monitoring, Rotation, and Analysis of Frequent and Heterogeneous Logs}, proceedings={Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India}, publisher={EAI}, proceedings_a={ICIDSSD}, year={2021}, month={3}, keywords={log security mining}, doi={10.4108/eai.27-2-2020.2303252} }
- Surendra Gaur
Nafisur Rahman
Year: 2021
A Secured Log Mining Approach to Collection, Monitoring, Rotation, and Analysis of Frequent and Heterogeneous Logs
ICIDSSD
EAI
DOI: 10.4108/eai.27-2-2020.2303252
Abstract
Organizations tend to develop their IT infrastructure in a way that complies with Network and Information Security standards. Logs play an important role with respect to security. It is very difficult to collect the logs from various hosts in real-time and analyze these raw log messages without the help of analysis tools. In this paper, we propose a log mining approach employing Centralized log server and Analyzer tools for extracting information that matters from a huge amount of log messages and displays messages. We begin by introducing the challenges faced by the internet world and the role of logs in this connection. Then we describe the problem of extraction and making sense of logs. Then we discuss the architecture and the entire workflow of the proposed solution and the method of log collection, monitoring, rotation, and analysis. Finally, we discuss the result report sample that establishes the usefulness of our approach.