Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.8.351

A Study on implementation model for security log analysis system using Big Data platform  

Han, Ki-Hyoung (KEPCO KDN)
Jeong, Hyung-Jong (KEPCO KDN)
Lee, Doog-Sik (IMCLOUD Corporation)
Chae, Myung-Hui (KT)
Yoon, Cheol-Hee (Korean National Police University)
Noh, Kyoo-Sung (Sun Moon University)
Publication Information
Journal of Digital Convergence / v.12, no.8, 2014 , pp. 351-359 More about this Journal
Abstract
The log data generated by security equipment have been synthetically analyzed on the ESM(Enterprise Security Management) base so far, but due to its limitations of the capacity and processing performance, it is not suited for big data processing. Therefore the another way of technology on the big data platform is necessary. Big Data platform can achieve a large amount of data collection, storage, processing, retrieval, analysis, and visualization by using Hadoop Ecosystem. Currently ESM technology has developed in the way of SIEM (Security Information & Event Management) technology, and to implement security technology in SIEM way, Big Data platform technology is essential that can handle large log data which occurs in the current security devices. In this paper, we have a big data platform Hadoop Ecosystem technology for analyzing the security log for sure how to implement the system model is studied.
Keywords
BigData Platform; Hadoop; Distributed Parallel Process; Data Visualization; ESM; SIEM;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jiaqi Zhaoa, Lizhe Wangb, Jie Taoc, Jinjun Chend, Weiye Sunc, Rajiv Ranjane, Joanna Kolodziejf, Achim Streitc, Dimitrios Georgakopoulose: "A security framework in G-Hadoop for big data computing across distributed Cloud data centres", Journal of Computer and System Sciences, Vol.80 No.5, 2014.
2 Kyoo-Sung Noh, Doosik Lee : "A study on implementation model for Big Data Platform", The Society of Digital Policy & Management, Spring Conference Paper, 2014.
3 Ok Hyun Ha: "A Study on Conversion Security Control System for Industrial Security", Korea Information Assuarance Society, Journal of Information and Security, Vol.9 No.4, 2009.   과학기술학회마을
4 Tankard, Colin : "Big data security", Network Security. Jul2012, Vol. 2012 Issue 7, 2012.
5 Xin Liang Li , Jian De Zheng : "Improvement of Hadoop Security Mechanism", Applied Mechanics and Materials (Volumes 484 - 485), Green Power, Materials and Manufacturing Technology and Applications III Chapter 7: Computer and Numerical Technologies 912-915, 2014.
6 http://flume.apache.org/
7 http://hadoop.apache.org/
8 http://hive.apache.org/
9 https://oozie.apache.org/
10 http://sqoop.apache.org/
11 http://www.r-project.org/
12 http://www.nodejs.org/
13 Cardenas, A. A. , Manadhata, P. K. , Rajan, S. P. : "Big Data Analytics for Security", IEEE SECURITY AND PRIVACY MAGAZINE Vol.11 No.6, 2013.
14 Forte, D. : "The importance of log files in security incident prevention", NETWORK SECURITY Vol.2009 No.7, 2009.
15 Dae-Soo Choi ,Gil-Jong Mun ,Yong-Min Kim, Bong-Nam Noh : "An Analysis of Large-Scale Security Log using MapReduce", Korean Institute Of Information Technology, Vol.9 No.8, 2011.