Spark-based log data analysis for reconstruction of cybercrime events in cloud environment

E. E. Hemdan, D. Manjaiah
{"title":"Spark-based log data analysis for reconstruction of cybercrime events in cloud environment","authors":"E. E. Hemdan, D. Manjaiah","doi":"10.1109/ICCPCT.2017.8074209","DOIUrl":null,"url":null,"abstract":"In recent times, the number of cybercrimes against cloud systems and services is rapidly growing. Although, there are numerous protection systems such as firewalls and intrusion detection and prevention system, and anti-viruses that are developed to protect cloud infrastructures and services from severe attacks, but still the risk of criminal activities exists. This lead to attract the attention of researchers and scientists around the world to digital forensic which is a science to aid law enforcement officers and digital investigator to identify, collect and analyze digital footprints or evidence which are collected from a crime scene. One of the significant sources of as a digital evidence in the cloud is log data because they frequently connect events in certain time. The process of log data forensics mitigates the investigation process by identifying the malicious behavior and reveal the hidden malicious activities. Cloud log analysis can help to reconstruct cybercrime events which occurred in the cloud. Traditional log data analysis procedures and tools can be adapted to cloud through using new fast on memory computing platforms such as Apache Spark. Spark is a general-purpose cluster-computing engine, which is very fast and reliable. This paper presents analysis approach for batch and stream log data using Apache Spark. The results show that Spark can be used as a fast platform for handling the diverse large size of log data and extract useful information that can assist digital investigators in the analysis immense amount of generated cloud log data in a given frame of time. Furthermore, the results can make provision to reconstruct and generate a timeline related to historical past sequence events occurred during a cloud crime as well as identify the malicious user's IP address, date and time, with a number of accesses.","PeriodicalId":208028,"journal":{"name":"2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2017.8074209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

In recent times, the number of cybercrimes against cloud systems and services is rapidly growing. Although, there are numerous protection systems such as firewalls and intrusion detection and prevention system, and anti-viruses that are developed to protect cloud infrastructures and services from severe attacks, but still the risk of criminal activities exists. This lead to attract the attention of researchers and scientists around the world to digital forensic which is a science to aid law enforcement officers and digital investigator to identify, collect and analyze digital footprints or evidence which are collected from a crime scene. One of the significant sources of as a digital evidence in the cloud is log data because they frequently connect events in certain time. The process of log data forensics mitigates the investigation process by identifying the malicious behavior and reveal the hidden malicious activities. Cloud log analysis can help to reconstruct cybercrime events which occurred in the cloud. Traditional log data analysis procedures and tools can be adapted to cloud through using new fast on memory computing platforms such as Apache Spark. Spark is a general-purpose cluster-computing engine, which is very fast and reliable. This paper presents analysis approach for batch and stream log data using Apache Spark. The results show that Spark can be used as a fast platform for handling the diverse large size of log data and extract useful information that can assist digital investigators in the analysis immense amount of generated cloud log data in a given frame of time. Furthermore, the results can make provision to reconstruct and generate a timeline related to historical past sequence events occurred during a cloud crime as well as identify the malicious user's IP address, date and time, with a number of accesses.
基于spark的云环境下网络犯罪事件重构日志数据分析
近年来,针对云系统和服务的网络犯罪数量正在迅速增长。虽然已经开发了许多保护系统,如防火墙和入侵检测和预防系统,以及防病毒软件,以保护云基础设施和服务免受严重攻击,但仍然存在犯罪活动的风险。这引起了世界各地研究人员和科学家对数字法医的关注,这是一门帮助执法人员和数字调查员识别、收集和分析从犯罪现场收集的数字足迹或证据的科学。日志数据是云中作为数字证据的重要来源之一,因为它们经常将特定时间内的事件联系起来。日志数据取证过程通过识别恶意行为和揭示隐藏的恶意活动来减轻调查过程。云日志分析可以帮助重建发生在云中的网络犯罪事件。传统的日志数据分析过程和工具可以通过使用新的快速内存计算平台(如Apache Spark)来适应云计算。Spark是一个通用的集群计算引擎,它非常快速和可靠。本文介绍了使用Apache Spark对日志数据进行批处理和流处理的分析方法。结果表明,Spark可以作为一个快速平台来处理各种大规模的日志数据,并提取有用的信息,可以帮助数字调查员在给定的时间框架内分析大量生成的云日志数据。此外,研究结果还可以重构和生成与云犯罪期间发生的历史序列事件相关的时间轴,并通过多次访问识别恶意用户的IP地址、日期和时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信