Potential threats mining methods based on correlation analysis of multi-type logs.

Tao Qin,Yuli Gao,Lingyan Wei,Zhaoli Liu,Chenxu Wang
DOI: https://doi.org/10.1049/iet-net.2017.0188
2018-01-01
IET Networks
Abstract:Log analysis is an efficiency way to detect threats by scrutinizing the events recorded by the operating systems and devices. However, it is more and more difficult to discover threats accurately due to the massive amount of logs and their various formats. Focusing on this problem, the authors propose a method for potential threats mining based on the correlation analysis of multi-type logs. First...
What problem does this paper attempt to address?