Skip to main content

Design of a Log Management Infrastructure Using Meta-Network Analysis

  • Conference paper
  • First Online:
Trust, Privacy and Security in Digital Business (TrustBus 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9830))

Included in the following conference series:

  • 628 Accesses

Abstract

The need for compliance or organization specific requirements is often guiding the implementation of a log management infrastructure. On a large scale infrastructure the log data are stored in various places, where analysts or administrators need to perform specific analysis tasks. In this work we propose a method for validating the design of the log collector part of the infrastructure, ensuring that each log collector has at its disposal the necessary log data for performing the desired analysis tasks. This is achieved by modeling the infrastructure as an organization and by applying social network analysis concepts and metrics that are used to analyze the structure and performance of real organizations. An example case study, demonstrating the workings of the method and the interpretation of the results, on a simulated infrastructure is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
EUR 29.95
Price includes VAT (Norway)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 35.30
Price includes VAT (Norway)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 42.00
Price excludes VAT (Norway)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kent, K., Souppaya, M.: Guide to Computer Security Log Management. NIST SP800-92 (2006). http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf. Accessed 23 Mar 2016

  2. Smith, J., Sanders, C.: Applied Network Security Monitoring, 1st edn. Syngress, Oxford (2014)

    Google Scholar 

  3. Cisco: Building Scalable Syslog Management Solutions (2015). http://www.cisco.com/c/en/us/products/collateral/services/high-availability/white_paper_c11-557812.html. Accessed 23 Mar 2016

  4. Schmidt, K.J., Chuvakin, A.: Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management, 1st edn. Syngress, Oxford (2013)

    Google Scholar 

  5. Carley, K.M., Reminga, J.: ORA: Organization Risk Analyzer. CASOS Technical report CMU-ISRI-04-106 (2004)

    Google Scholar 

  6. Faust, K., Wasserman, S.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    MATH  Google Scholar 

  7. Li, Y., Lu, Y., Li, D., Ma, L.: Metanetwork analysis for project task assignment. J. Constr. Eng. Manag. 141(12): (2015). http://dx.doi.org/10.1061/(ASCE)CO.1943-7862.0001019

    Google Scholar 

  8. Liu, J., Guo, J., An, R., Gao, K.: Study on data acquisition solution of network security monitoring system. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, pp. 674–677 (2010)

    Google Scholar 

  9. Rezayi, S., Gharaee, H., Madani, A.: Log management comprehensive architecture in Security Operation Center (SOC). In: International Conference on Computational Aspects of Social Networks (CASoN), Salamanca, pp. 284–289 (2011)

    Google Scholar 

  10. Uehara, M., Shimada, Y., Tomono, A.: Trusted log management system (chap. 5). In: Khalil, I., Mantoro, T. (eds.) Trustworthy Ubiquitous Computing, pp. 79–98. Springer, Atlantis Press, Berlin (2012)

    Google Scholar 

  11. Kala, T.K., Murugan, A.: An effective secured cloud based log management system using homomorphic encryption. Int. J. Comput. Sci. Inf. Technol. 5(2), 2268–2271 (2014)

    Google Scholar 

  12. PawarAnil, S., RajebhosaleSagar, B.: Development of highly secured cloud rendered log management system. Int. J. Comput. Appl. 108(16), December 2014

    Google Scholar 

  13. Anastopoulos, V., Katsikas, S.: A methodology for building a log management infrastructure. In: Proceedings of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2014), pp. 301–306 (2015). doi:10.1109/ISSPIT.2014.7300604

  14. Mrvar, A., Batagelj, V., Nooy, W.D.: Exploratory Social Network Analysis with Pajek (Structural Analysis in the Social Sciences), 2nd edn. Cambridge University Press, Cambridge (2011)

    Google Scholar 

  15. Borgatti, S.P.: The key player problem. In: Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers (2003)

    Google Scholar 

  16. Borgatti, S.: Identifying Sets of Key Players in a Social Network, pp. 21–34. Springer Science, Berlin (2006)

    MATH  Google Scholar 

  17. Krackhardt, D., Carley, K.M.: PCANS Model of Structure in Organizations. Institute for Complex Engineered Systems, Carnegie Mellon University, Pittsburgh (1998)

    Google Scholar 

  18. Carley, K.M.: Computational organizational science and organizational engineering. Simul. Model. Pract. Theor. 10(5), 253–269 (2002)

    Article  MATH  Google Scholar 

  19. Wakolbinger, T., Nagurney, A.: Dynamic supernetworks for the integration of social networks and supply chains with electronic commerce: modeling and analysis of buyer-seller relationships with computations. NETNOMICS: Econ. Res. Electron. Netw. 6(2), 153–185 (2004)

    Article  Google Scholar 

  20. Nagurney, A., Wakolbinger, T., Zhao, L.: The evolution and emergence of integrated social and financial networks with electronic transactions: a dynamic supernetwork theory for the modeling, analysis, and computation of financial flows and relationship levels. Comput. Econ. 27(2–3), 353–393 (2006)

    Article  MATH  Google Scholar 

  21. Nagurney, A., Dong, J.: Management of knowledge intensive systems as supernetworks: modeling, analysis, computations, and applications. Math. Comput. Model. 42(3), 397–417 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  22. Tucker, L.R.: Implications of factor analysis of thee-way matrices for measurement of change. In: Harris, C.W. (ed.) Problems in Measuring Change, pp. 122–137. University of Wisconsin Press, Madison (1963)

    Google Scholar 

  23. Carley, K.M., Pfeffer, J., Reminga, J., Storrick, J., Columbus, D.: ORA User’s Guide 2013. CMU-ISR-13-108, School of Computer Science, Institute for Software Research, Carnegie Mellon University, Pittsburgh, PA 15213, June 2013

    Google Scholar 

  24. Lee, J.-S., Carley, K.M.: OrgAhead: a computational model of organizational learning and decision making. Technical report CMU-ISRI-04-117, School of Computer Science, Institute for Software Research International, Carnegie Mellon University, Pittsburgh (2004)

    Google Scholar 

  25. Carley, K.M.: Summary of Key Network Measures for Characterizing Organizational Architectures. Carnegie Mellon University, Pittsburgh (2002). Collins, M.S.: Network Security Through Data Analysis: Building Situational Awareness, 1st edn. O’Reilly Media, Sebastopol (2014)

    Google Scholar 

  26. Homepage|CASOS. http://www.casos.cs.cmu.edu/index.php. Accessed 23 Mar 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sokratis Katsikas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Anastopoulos, V., Katsikas, S. (2016). Design of a Log Management Infrastructure Using Meta-Network Analysis. In: Katsikas, S., Lambrinoudakis, C., Furnell, S. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2016. Lecture Notes in Computer Science(), vol 9830. Springer, Cham. https://doi.org/10.1007/978-3-319-44341-6_7

Download citation

Keywords

Publish with us

Policies and ethics