Spray: Streaming Log Parser for Real-Time Analysis

Author:

Zou Feng1ORCID,Chen Xingshu2ORCID,Luo Yonggang2ORCID,Huang Tiemai3,Liao Zhihong3,Song Keer3

Affiliation:

1. Institute of Computer Application, China Academy of Engineering Physics, Mianyang 621000, Sichuan, China

2. School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, Sichuan, China

3. China Mobile (Chengdu) Information & Telecommunication Technology Co., Ltd., Chengdu 610065, Sichuan, China

Abstract

Logs is an important source of data in the field of security analysis. Log messages characterized by unstructured text, however, pose extreme challenges to security analysis. To this end, the first issue to be addressed is how to efficiently parse logs into structured data in real-time. The existing log parsers mostly parse raw log files by batch processing and are not applicable to real-time security analysis. It is also difficult to parse large historical log sets with such parsers. Some streaming log parsers also have some demerits in accuracy and parsing performance. To realize automatic, accurate, and efficient real-time log parsing, we propose Spray, a streaming log parser for real-time analysis. Spray can automatically identify the template of a real-time incoming log and accurately match the log and its template for parsing based on the law of contrapositive. We also improve Spray’s parsing performance based on key partitioning and search tree strategies. We conducted extensive experiments from such aspects as accuracy and performance. Experimental results show that Spray is much more accurate in parsing a variety of public log sets and has higher performance for parsing large log sets.

Funder

Defense Industrial Technology Development Program

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference28 articles.

1. Towards process mining utilization in insider threat detection from audit logs;M. Macak

2. Topase: Detection of brute force attacks used disciplined IPs from IDS log;S. Honda

3. Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis;Q. Fu

4. Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection;C. Bertero

5. Prediction of web user behavior by discovering temporal relational rules from web log data;X. Yu

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3