Publication:
Detection of suspicious activities on windows systems with log analysis

dc.contributor.authorÜLKÜ, EYÜP EMRE
dc.contributor.authorsÖztürk A., ÜLKÜ E. E.
dc.date.accessioned2023-01-02T11:14:36Z
dc.date.available2023-01-02T11:14:36Z
dc.date.issued2022-12-21
dc.description.abstractIn recent years, rapid technological developments in many different fields have brought along various problems along with many innovations. One of these problems is cyber-attacks. Storing many records and data in digital media has made it very important to protect these records and data. Continuous log records play an important role in taking necessary precautions against cyber-attacks by system administrators. With the logging mechanism found in Windows systems, every transaction made on the system is recorded. These log records are analyzed with various algorithms and tools. As a result of these analyzes, suspicious or attacker behaviors on the system are detected. In this study, various cyber-attacks were tested in an environment where these Windows systems are located. As a result of these tests, the logs formed in the systems were collected and analyzed with the ELK Stack toolkit. As a result of these analyzes, the attacks were determined and associated with the tactics and techniques on Mitre ATT & CK.
dc.identifier.citationÖztürk A., ÜLKÜ E. E., \"Detection of Suspicious Activities on Windows Systems with Log Analysis\", International Conference on Engineering Technologies 2022 (ICENTE'2022), Konya, Türkiye, 17 Kasım 2022
dc.identifier.endpage80
dc.identifier.startpage77
dc.identifier.urihttps://icente.selcuk.edu.tr/uploads/files2/ICENTE22_Proceedings_Book_v2.pdf
dc.identifier.urihttps://hdl.handle.net/11424/284665
dc.language.isoeng
dc.relation.ispartofInternational Conference on Engineering Technologies 2022 (ICENTE'2022)
dc.rightsinfo:eu-repo/semantics/openAccess
dc.subjectLog analysis
dc.subjectMitre Att&CK
dc.subjectELK Stack
dc.subjectWindows Systems
dc.titleDetection of suspicious activities on windows systems with log analysis
dc.typeconferenceObject
dspace.entity.typePublication
local.avesis.id52df290c-5387-4bf8-9c38-ce631836f998
relation.isAuthorOfPublication4afa2e18-6b43-4fdd-978b-cc9836c6f9d5
relation.isAuthorOfPublication.latestForDiscovery4afa2e18-6b43-4fdd-978b-cc9836c6f9d5

Files

Collections