An automatic approach to extract the formats of network and security log messages.
Jing YaTingwen LiuHaoliang ZhangJinqiao ShiLi GuoPublished in: MILCOM (2015)
Keyphrases
- security protection
- network management
- network traffic
- security threats
- computer networks
- network layer
- communication channels
- security measures
- multimedia
- cyber attacks
- forensic analysis
- network administrators
- information security
- complex networks
- intrusion prevention
- network connection
- denial of service attacks
- intrusion detection and prevention
- intrusion detection
- security issues
- statistical databases
- network security
- network structure
- fully automatic
- semi automatic
- security problems
- dos attacks
- security mechanisms
- security risks
- security policies
- network model
- enterprise network
- single point of failure