Acknowledgement
Supported by : 국가핵융합연구소
References
- J. Babbin, D. Kleiman and E.F Carter, "Security Log Management," SYNGRESS, pp. 244-251, Jan. 2006.
- [Online]. Available: https://msdn.microsoft.com/ko-kr/library/aa394594(v=vs.85).aspx
- [Online]. Available: Scribe, https://github.com/facebookarchive/scribe
- [Online]. Available: Flume, https://flume.apache.org/
- [Online]. Available: Chukwa, https://chukwa.apache.org/
- Logstash, [Online]. Available: https://www.elastic.co/products/logstash
- Elasticsearch, [Online]. Available: https://www.elastic.co/products/elasticsearch
- Kibana, [Online]. Available: https://www.elastic.co/products/kibana
- Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E., "Cutting the gordian knot: a look under the hood of ransomware attacks," In Detection of Intrusions and Malware, and Vulnerability Assessment Springer International Publishing, pp. 3-24, 2015.