NUST Institutional Repository

R-ELK stack for log analysis using customized ids signature

Show simple item record

dc.contributor.author Ishfaq, Hassan
dc.contributor.author Supervised by Baber Aslam.
dc.date.accessioned 2020-10-26T08:16:20Z
dc.date.available 2020-10-26T08:16:20Z
dc.date.issued 2017-07
dc.identifier.other TIS-233
dc.identifier.other MSIS-12
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/4980
dc.description.abstract Now a days, almost every device including computer, routers, switches, firewalls, software and services generate logs continuously. As number of devices in any large network are large and grow with every new installation, it is administratively becoming less feasible to do monitoring and analysis of each device. With the growing trend of big data of logs, companies tend to rely more on expensive SIEM solutions for log analysis. However, with the introduction of open source, lightweight and rich featured Search Engine Database models the approaches towards searching data content have become ubiquitous. Proposed System uses open source Generic search engine Elastic Search with other components in order to process large amount of logs and detect attacks via developed IDS signatures through Attack Signature Framework. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title R-ELK stack for log analysis using customized ids signature en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account