Skip to main content
Article
FLUKES: Autonomous log forensics, intelligence and visualization tool
ACM International Conference Proceeding Series
  • Monther Aldwairi, Zayed University
  • Hesham H. Alsaadi, Zayed University
Document Type
Conference Proceeding
Publication Date
7-19-2017
Abstract

© 2017 Association for Computing Machinery. The number of structured and unstructured logs datasets is increasing, and the complexity of analyzing threats from log files poses a challenge to the research community. We propose intelligent technique to visualize and extract threats from logs files using D3.js modules with standard RegEx API, called "FLUKES". In this paper we investigate the text-based ASCII format FTP, Snort, Apache and IIS server logs. When a content of a file type .json, .csv, .log, and .txt format is loaded into FLUKES, a representative summary is executed with least signi?cant a?ack traces. FLUKES will formalize and generate a new signature pa?ern that eases the process of detection and analysis of threat anomalies in log files. Forensic investigators can then determine a set of certain fields relevant to the a?ack according to the corresponding target. We present an example investigation comparison based on FTP and Apache server logs collected and managed using Snort. The ultimate contribution is to forensically determine the summary of authentication (failed and successful) a?empts to secure systems and traces found without altering the log evidence.

ISBN
9781450348447
Publisher
Association for Computing Machinery
Disciplines
Keywords
  • D3,
  • Intrusion detection,
  • Intrusion prevention,
  • Log forensics,
  • Visualization
Scopus ID
85030450515
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1145/3102304.3102337
Citation Information
Monther Aldwairi and Hesham H. Alsaadi. "FLUKES: Autonomous log forensics, intelligence and visualization tool" ACM International Conference Proceeding Series Vol. Part F130522 (2017) p. 33
Available at: http://works.bepress.com/monther-aldwairi/7/