Abstract
The need for compliance or organization specific requirements is often guiding the implementation of a log management infrastructure. On a large scale infrastructure the log data are stored in various places, where analysts or administrators need to perform specific analysis tasks. In this work we propose a method for validating the design of the log collector part of the infrastructure, ensuring that each log collector has at its disposal the necessary log data for performing the desired analysis tasks. This is achieved by modeling the infrastructure as an organization and by applying social network analysis concepts and metrics that are used to analyze the structure and performance of real organizations. An example case study, demonstrating the workings of the method and the interpretation of the results, on a simulated infrastructure is also presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kent, K., Souppaya, M.: Guide to Computer Security Log Management. NIST SP800-92 (2006). http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf. Accessed 23 Mar 2016
Smith, J., Sanders, C.: Applied Network Security Monitoring, 1st edn. Syngress, Oxford (2014)
Cisco: Building Scalable Syslog Management Solutions (2015). http://www.cisco.com/c/en/us/products/collateral/services/high-availability/white_paper_c11-557812.html. Accessed 23 Mar 2016
Schmidt, K.J., Chuvakin, A.: Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management, 1st edn. Syngress, Oxford (2013)
Carley, K.M., Reminga, J.: ORA: Organization Risk Analyzer. CASOS Technical report CMU-ISRI-04-106 (2004)
Faust, K., Wasserman, S.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Li, Y., Lu, Y., Li, D., Ma, L.: Metanetwork analysis for project task assignment. J. Constr. Eng. Manag. 141(12): (2015). http://dx.doi.org/10.1061/(ASCE)CO.1943-7862.0001019
Liu, J., Guo, J., An, R., Gao, K.: Study on data acquisition solution of network security monitoring system. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, pp. 674–677 (2010)
Rezayi, S., Gharaee, H., Madani, A.: Log management comprehensive architecture in Security Operation Center (SOC). In: International Conference on Computational Aspects of Social Networks (CASoN), Salamanca, pp. 284–289 (2011)
Uehara, M., Shimada, Y., Tomono, A.: Trusted log management system (chap. 5). In: Khalil, I., Mantoro, T. (eds.) Trustworthy Ubiquitous Computing, pp. 79–98. Springer, Atlantis Press, Berlin (2012)
Kala, T.K., Murugan, A.: An effective secured cloud based log management system using homomorphic encryption. Int. J. Comput. Sci. Inf. Technol. 5(2), 2268–2271 (2014)
PawarAnil, S., RajebhosaleSagar, B.: Development of highly secured cloud rendered log management system. Int. J. Comput. Appl. 108(16), December 2014
Anastopoulos, V., Katsikas, S.: A methodology for building a log management infrastructure. In: Proceedings of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2014), pp. 301–306 (2015). doi:10.1109/ISSPIT.2014.7300604
Mrvar, A., Batagelj, V., Nooy, W.D.: Exploratory Social Network Analysis with Pajek (Structural Analysis in the Social Sciences), 2nd edn. Cambridge University Press, Cambridge (2011)
Borgatti, S.P.: The key player problem. In: Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers (2003)
Borgatti, S.: Identifying Sets of Key Players in a Social Network, pp. 21–34. Springer Science, Berlin (2006)
Krackhardt, D., Carley, K.M.: PCANS Model of Structure in Organizations. Institute for Complex Engineered Systems, Carnegie Mellon University, Pittsburgh (1998)
Carley, K.M.: Computational organizational science and organizational engineering. Simul. Model. Pract. Theor. 10(5), 253–269 (2002)
Wakolbinger, T., Nagurney, A.: Dynamic supernetworks for the integration of social networks and supply chains with electronic commerce: modeling and analysis of buyer-seller relationships with computations. NETNOMICS: Econ. Res. Electron. Netw. 6(2), 153–185 (2004)
Nagurney, A., Wakolbinger, T., Zhao, L.: The evolution and emergence of integrated social and financial networks with electronic transactions: a dynamic supernetwork theory for the modeling, analysis, and computation of financial flows and relationship levels. Comput. Econ. 27(2–3), 353–393 (2006)
Nagurney, A., Dong, J.: Management of knowledge intensive systems as supernetworks: modeling, analysis, computations, and applications. Math. Comput. Model. 42(3), 397–417 (2005)
Tucker, L.R.: Implications of factor analysis of thee-way matrices for measurement of change. In: Harris, C.W. (ed.) Problems in Measuring Change, pp. 122–137. University of Wisconsin Press, Madison (1963)
Carley, K.M., Pfeffer, J., Reminga, J., Storrick, J., Columbus, D.: ORA User’s Guide 2013. CMU-ISR-13-108, School of Computer Science, Institute for Software Research, Carnegie Mellon University, Pittsburgh, PA 15213, June 2013
Lee, J.-S., Carley, K.M.: OrgAhead: a computational model of organizational learning and decision making. Technical report CMU-ISRI-04-117, School of Computer Science, Institute for Software Research International, Carnegie Mellon University, Pittsburgh (2004)
Carley, K.M.: Summary of Key Network Measures for Characterizing Organizational Architectures. Carnegie Mellon University, Pittsburgh (2002). Collins, M.S.: Network Security Through Data Analysis: Building Situational Awareness, 1st edn. O’Reilly Media, Sebastopol (2014)
Homepage|CASOS. http://www.casos.cs.cmu.edu/index.php. Accessed 23 Mar 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Anastopoulos, V., Katsikas, S. (2016). Design of a Log Management Infrastructure Using Meta-Network Analysis. In: Katsikas, S., Lambrinoudakis, C., Furnell, S. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2016. Lecture Notes in Computer Science(), vol 9830. Springer, Cham. https://doi.org/10.1007/978-3-319-44341-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-44341-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44340-9
Online ISBN: 978-3-319-44341-6
eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science