Potential threats mining methods based on correlation analysis of multi‐type logs

Log analysis is an efficiency way to detect threats by scrutinizing the events recorded by the operating systems and devices. However, it is more and more difficult to discover threats accurately due to the massive amount of logs and their various formats. Focusing on this problem, the authors propo...

Full description

Bibliographic Details
Main Authors: Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang
Format: Article
Language:English
Published: Wiley 2018-09-01
Series:IET Networks
Subjects:
Online Access:https://doi.org/10.1049/iet-net.2017.0188