• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > JIPS (Çѱ¹Á¤º¸Ã³¸®ÇÐȸ)

JIPS (Çѱ¹Á¤º¸Ã³¸®ÇÐȸ)

Current Result Document : 22 / 301 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack
¿µ¹®Á¦¸ñ(English Title) A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack
ÀúÀÚ(Author) Jisun Kim   Eulhan Jo   Sungwon Lee   Taenam Cho  
¿ø¹®¼ö·Ïó(Citation) VOL 17 NO. 04 PP. 0772 ~ 0786 (2021. 08)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.
Å°¿öµå(Keyword) Active Directory   Digital Forensics   Elastic Stack   Microsoft Windows Log   Security   Shared Folder  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå