Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools

作者:

Highlights:

• Generating log data that reflects realistic network behavior.

• Log data modeling, based on log line clustering and Markov chain simulation.

• Rate, analyze and improve software tools, which exploit log data.

• Detailed evaluation of the model and presentation of an illustrative application.

• Cornerstones to improve the selection, deployment and operation of IDSs.

摘要

Highlights•Generating log data that reflects realistic network behavior.•Log data modeling, based on log line clustering and Markov chain simulation.•Rate, analyze and improve software tools, which exploit log data.•Detailed evaluation of the model and presentation of an illustrative application.•Cornerstones to improve the selection, deployment and operation of IDSs.

论文关键词:Log line clustering,Markov chains,Log file analysis,Log data modeling,IDS deployment optimization

论文评审过程:Received 18 December 2015, Accepted 17 February 2016, Available online 26 February 2016, Version of Record 24 March 2016.

论文官网地址:https://doi.org/10.1016/j.is.2016.02.006