Ibrahim Yahya Mohammed Al-Mahbashi, M. Potdar, Prashant Chauhan
{"title":"Network security enhancement through effective log analysis using ELK","authors":"Ibrahim Yahya Mohammed Al-Mahbashi, M. Potdar, Prashant Chauhan","doi":"10.1109/ICCMC.2017.8282530","DOIUrl":null,"url":null,"abstract":"The main aim for any organization is to provide protection for their critical assets because they are face to face with many external threats that may cause interruption on providing services to customers which will lead to economical and reputation disaster. As long as organizations need to provide the protection required to secure their business they have to focus on two types of threats, internal and external threats. In previous paper [1] I have discussed about external threats and in this paper I will draw more attention on how the internal threats that will affect the overall network security mechanism. Log analysis can also help us to reveal the gap existed on our safeguards, which used to provide a protection for our systems, by which we can have a knowledge from the information extracted from our data that will help us to be aware of the gaps and vulnerabilities may found to resolve them before we become victims. For log analysis I will use ELK stack that will help me to receive the forwarded logs from a well-known commercial safeguard deployed in a real environment.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2017.8282530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
The main aim for any organization is to provide protection for their critical assets because they are face to face with many external threats that may cause interruption on providing services to customers which will lead to economical and reputation disaster. As long as organizations need to provide the protection required to secure their business they have to focus on two types of threats, internal and external threats. In previous paper [1] I have discussed about external threats and in this paper I will draw more attention on how the internal threats that will affect the overall network security mechanism. Log analysis can also help us to reveal the gap existed on our safeguards, which used to provide a protection for our systems, by which we can have a knowledge from the information extracted from our data that will help us to be aware of the gaps and vulnerabilities may found to resolve them before we become victims. For log analysis I will use ELK stack that will help me to receive the forwarded logs from a well-known commercial safeguard deployed in a real environment.