A Comprehensive Survey of Event Analytics

A Comprehensive Survey of Event Analytics

T. Gidwani, M. J. Argano, W. Yan, F. Issa
Copyright: © 2012 |Pages: 14
DOI: 10.4018/jdcf.2012070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Analytics has emerged as an important area of study as it avoids further incidents or risks after the events have occurred; this is done by analysing computer events and making further statistics. The purpose of this survey is to gain knowledge for the authors’ own event knowledge database which will consist of how unusual events work and how they are related to other events. The algorithms mentioned in this paper have been used to build their future development, resulting in a knowledge database designed to be similar to an internet browser engine where it can search events and their relationships. The research and algorithms have helped the authors to decide on the technology they will be using for the knowledge database.
Article Preview
Top

1. Introduction

An event is an occurrence within a computer system that converses with other systems or users. Computer and network systems contain event logs that holds enormous amount of data. These event logs hold records of any behaviors or actions a network device performs. Events may also involve illegal activities such as malicious attacks or unexpected data movement. The plan is to assemble these events and to examine their relationships with research and recording each activity into a knowledge database. This information will help avoid further incidents or risks after events have occurred.

Event analytics is a complex scheme therefore we have created subcategories for our research. We divided this into four major components: computer event surveillance, computer event monitoring, computer event forensic and computer event security. In this paper, we have combined computer event surveillance and computer event monitoring together and computer event forensic and computer event security together shown on Figure 1. An extensive research was conducted throughout these subcategories. We have selected the articles written by professionals in their respected fields.

Figure 1.

Structure of event analytics

jdcf.2012070103.f01

This paper will be divided into four sections: Section 2 will be on state of the arts, which is the highest level of development or technique at this time, a range or systems and techniques will be introduced here. Section 3 will be on existing systems and algorithms. Section 4 will then be the conclusion that will encapsulate our insights on what was useful and what we have learnt from this research.

Top

2. The State Of The Arts

This section covers the highest level of development of computer analytics; it includes topics such as computer surveillance systems, computer forensic events, monitoring events and network events security related methodologies, which are currently being employed. This section contains up to date ideas and knowledge of computer analytics, which can help to make advancements in already existing methodologies.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing