Pseudo-random access compressed archive for security log data

dc.contributor.advisorBradshaw, Karen
dc.contributor.advisorIrwin, Barry
dc.contributor.authorRadley, Johannes Jurgens
dc.date.accessioned2026-03-04T08:22:03Z
dc.date.issued2015
dc.description.abstractWe are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compressed file. This yields an entry identifier for each log entry that provides a pointer that can be used by indexing methods. The research also evaluates the compression performance penalties encountered by using this storage system, including decreased compression ratio, as well as increased compression and decompression times.
dc.description.degreeMaster's thesis
dc.description.degreeMSc
dc.format.extent99 pages
dc.format.mimetypeapplication/pdf
dc.identifier.otherhttp://hdl.handle.net/10962/d1020019
dc.identifier.urihttps://researchrepository.ru.ac.za/handle/123456789/5827
dc.languageEnglish
dc.publisherRhodes University, Faculty of Science, Department of Computer Science
dc.rightsRadley, Johannes Jurgens
dc.subjectComputer security
dc.subjectInformation storage and retrieval systems
dc.subjectData compression (Computer science)
dc.titlePseudo-random access compressed archive for security log data
dc.typeAcademic thesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Pseudo-random_access_compressed_archive_for_securi_vital_4723.pdf
Size:
1.13 MB
Format:
Adobe Portable Document Format