With the widespread use of information, variety of security logs have increased greatly, which due need for security log management. Organizations requirements have imposed to collect, store, and analyze tremendous volumes of log data across entire infrastructure for extended durations and at increasingly granular levels. It is the process of generating, transmitting, storing, analyzing, and disposing security log data from network to databases. Due to the wide variety of logs, storing comprises different methods. Recorded events in collection module are processed, normalized and classified. Logs are stored in storage module in order to use in forensic, reviewing, auditing and providing further necessities of correlation module. Routine log correlation analysis is beneficial for identifying security incidents, policy violations, fraudulent activities, troubleshooting and operational network problems. So log management is an important and efficient activity in network monitoring. Finding an effective log management functional architecture for network events analysis is the main goal of this paper. In this paper, we aim to suggest log management architecture with more common functions that are used by vendors. By studying logging architectures the main functions are administration of log collection, normalizing, categorization, queuing prioritizing and storing logged events/alarms by sensors. Log functions are different but the suitable architecture must justify the functions to send a normative, synchronized and prioritized log in an efficient way. The mentioned functions are gathered from SIEM products characteristics. Suggested architecture includes functions and activities in log collection server and storage server.
[1]
Dominique A. Heger.
San and Nas Solutions -introduction, Topology, and Terminology
,
2006
.
[2]
Hervé Debar,et al.
The Intrusion Detection Message Exchange Format (IDMEF)
,
2007,
RFC.
[3]
Common Event Expression
,
2008
.
[4]
Tian Yue,et al.
The Research and Design of Log Management System Based on Struts Frame
,
2008,
2008 International Symposium on Computer Science and Computational Technology.
[5]
Minoru Uehara,et al.
A Log Management System for Internal Control
,
2009,
2009 International Conference on Network-Based Information Systems.
[6]
Piotr Bródka,et al.
International Conference on Computational Aspects of Social Networks
,
2009,
Computational Aspects of Social Networks.
[7]
Nas Topology.
SAN and NAS Solutions - Introduction, Topology, and Terminology
,
2006
.
[8]
Kelly M. Kavanagh,et al.
Magic Quadrant for Security Information and Event Management
,
2011
.
[9]
Murugiah P. Souppaya,et al.
SP 800-92. Guide to Computer Security Log Management
,
2006
.