Home // International Journal On Advances in Security, volume 2, numbers 2 and 3, 2009 // View article
Authors:
Tobias Hoppe
Alexander Pastwa
Sebastian Sowa
Keywords: Business Intelligence; Data Mining; Malware; Online Analytical Processing; Security Information and Event Management
Abstract:
Enterprises face various risks when trying to achieve their primary goals. In regard to the information infrastructure of an enterprise, this leads to the necessity to implement an integrated set of measures which should protect the information and information technological assets effectively and efficiently. Furthermore, tools are needed for assessing risks and the performances of measures in order to guarantee continuous effort to protect the enterprises’ assets. These tools have to be able to support the handling of the vast amount of security relevant data generated within the enterprise information infrastructure and their analysis. Both tasks are typical for security information and event management. In this context, the current paper introduces an approach for malware log data analysis by using business intelligence methods. Thereby, examples are given which are derived from the results of a project being conducted with a world-wide operating enterprise.
Pages: 203 to 213
Copyright: Copyright (c) to authors, 2009. Used with permission.
Publication date: December 1, 2009
Published in: journal
ISSN: 1942-2636