Potential threats mining methods based on correlation analysis of multi‐type logs
Log analysis is an efficiency way to detect threats by scrutinizing the events recorded by the operating systems and devices. However, it is more and more difficult to discover threats accurately due to the massive amount of logs and their various formats. Focusing on this problem, the authors propo...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2018-09-01
|
Series: | IET Networks |
Subjects: | |
Online Access: | https://doi.org/10.1049/iet-net.2017.0188 |