{"title":"Security Analysis of University Web Log Based on Elk","authors":"J. Gong, S. Ling","doi":"10.1109/ICAA53760.2021.00125","DOIUrl":null,"url":null,"abstract":"In order to solve the web application security threats of campus network, a log security threat monitoring platform based on elk is designed. Firstly, the data of Web log is analyzed, and the attack patterns of security threats are mined to form a security monitoring model library, which is applied to real-time security monitoring. The system operation results show that the platform can effectively find the security threats in the campus network, visual association analysis is convenient, and can effectively improve the operation and maintenance efficiency and the speed of security attack investigation.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAA53760.2021.00125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In order to solve the web application security threats of campus network, a log security threat monitoring platform based on elk is designed. Firstly, the data of Web log is analyzed, and the attack patterns of security threats are mined to form a security monitoring model library, which is applied to real-time security monitoring. The system operation results show that the platform can effectively find the security threats in the campus network, visual association analysis is convenient, and can effectively improve the operation and maintenance efficiency and the speed of security attack investigation.