{"id":"https://openalex.org/W3183530150","doi":"https://doi.org/10.1145/3459104.3459135","title":"Network Forensics Investigation in Virtual Data Centers Using ELK","display_name":"Network Forensics Investigation in Virtual Data Centers Using ELK","publication_year":2021,"publication_date":"2021-02-19","ids":{"openalex":"https://openalex.org/W3183530150","doi":"https://doi.org/10.1145/3459104.3459135","mag":"3183530150"},"language":"en","primary_location":{"id":"doi:10.1145/3459104.3459135","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3459104.3459135","pdf_url":null,"source":{"id":"https://openalex.org/S4306498858","display_name":"2021 International Symposium on Electrical, Electronics and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Electrical, Electronics and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"P. Rajesh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125823","display_name":"KLE University","ror":"https://ror.org/03aam9155","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125823"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P. Rajesh","raw_affiliation_strings":["K L Deemed to be University, India"],"affiliations":[{"raw_affiliation_string":"K L Deemed to be University, India","institution_ids":["https://openalex.org/I4210125823"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101541087","display_name":"Mohammed Ismail","orcid":"https://orcid.org/0000-0003-4480-3801"},"institutions":[{"id":"https://openalex.org/I52703040","display_name":"Kannur University","ror":"https://ror.org/00zz2cd87","country_code":"IN","type":"education","lineage":["https://openalex.org/I52703040"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammed Ismail. Ismail. B.","raw_affiliation_strings":["Kannur University campus Mangattuparamba, India"],"affiliations":[{"raw_affiliation_string":"Kannur University campus Mangattuparamba, India","institution_ids":["https://openalex.org/I52703040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022704080","display_name":"Mansoor Alam","orcid":"https://orcid.org/0000-0003-1732-205X"},"institutions":[{"id":"https://openalex.org/I4210145386","display_name":"National Intelligence University","ror":"https://ror.org/049sfwc36","country_code":"US","type":"education","lineage":["https://openalex.org/I4210145386"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mansoor Alam","raw_affiliation_strings":["NIU, USA"],"affiliations":[{"raw_affiliation_string":"NIU, USA","institution_ids":["https://openalex.org/I4210145386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065362647","display_name":"Mansour Tahernezhadi","orcid":"https://orcid.org/0000-0003-1279-6862"},"institutions":[{"id":"https://openalex.org/I102502594","display_name":"Northern Illinois University","ror":"https://ror.org/012wxa772","country_code":"US","type":"education","lineage":["https://openalex.org/I102502594"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mansour Tahernezhadi","raw_affiliation_strings":["Northern Illinois University, USA"],"affiliations":[{"raw_affiliation_string":"Northern Illinois University, USA","institution_ids":["https://openalex.org/I102502594"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109364042","display_name":"A. Monika","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134118","display_name":"Sanjivani Super Speciality Hospitals","ror":"https://ror.org/03mzdta96","country_code":"IN","type":"healthcare","lineage":["https://openalex.org/I4210134118"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Monika A.","raw_affiliation_strings":["Sanjivani College of Engineering, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Sanjivani College of Engineering, Maharashtra, India","institution_ids":["https://openalex.org/I4210134118"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210125823"],"apc_list":null,"apc_paid":null,"fwci":1.601,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84192753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"175","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.8879421353340149},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7159700393676758},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5089511871337891},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4953988790512085},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4728070795536041},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.45585474371910095},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4540695250034332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44179508090019226},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.4220709800720215},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4128623306751251}],"concepts":[{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.8879421353340149},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7159700393676758},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5089511871337891},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4953988790512085},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4728070795536041},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.45585474371910095},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4540695250034332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44179508090019226},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.4220709800720215},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4128623306751251}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3459104.3459135","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3459104.3459135","pdf_url":null,"source":{"id":"https://openalex.org/S4306498858","display_name":"2021 International Symposium on Electrical, Electronics and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Electrical, Electronics and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2002227246","https://openalex.org/W2040340473","https://openalex.org/W2044353873","https://openalex.org/W2295872724","https://openalex.org/W2607893715","https://openalex.org/W2785116484","https://openalex.org/W2940588914","https://openalex.org/W3003990341","https://openalex.org/W4230265934","https://openalex.org/W4240035292","https://openalex.org/W7061674356"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W2480188389","https://openalex.org/W4283205458","https://openalex.org/W3018602826","https://openalex.org/W2373124162","https://openalex.org/W2532563258","https://openalex.org/W3001565613","https://openalex.org/W2061171250","https://openalex.org/W4288054537"],"abstract_inverted_index":{"Network":[0,9,57,75,84,117,139,160,204,224],"forensics":[1,91,202,205,225],"is":[2,28,86,126,147,182,210,227],"a":[3,18,228,235],"focus":[4],"on":[5,44,114,149],"collecting,":[6,157],"monitoring,":[7,158],"reporting":[8,159],"log":[10,161,189,194,243],"analysis":[11,78,97,162,190,199],"and":[12,66,96,121,154,163,191,213],"investigation":[13,140,206,226],"success":[14],"or":[15,72,111],"failure":[16],"in":[17,81,141,176,195,207,234],"network.":[19,116,236],"Major":[20],"goal":[21],"of":[22,89,98,136,138,220,242],"security":[23],"provided":[24],"to":[25,29,63,128,156,167,216,230],"the":[26,82,94,115,130,134,169],"network":[27,68,100,201],"protect":[30],"sensitive":[31],"customer":[32],"information":[33],"online,":[34],"Lateral":[35],"movement":[36],"with":[37],"RDP":[38],"(Remote":[39],"Desktop":[40],"Protocol),":[41],"Ransomware":[42],"running":[43],"an":[45,87,211],"endpoint,":[46],"large":[47],"Data":[48,143,180,237],"exfiltration":[49],"from":[50],"multiple":[51],"endpoints,":[52],"malicious":[53],"attacks":[54],"etc,":[55],"degrade":[56],"Performance.":[58],"but":[59],"crime":[60],"scenario":[61],"starts":[62],"identify":[64,231],"crimes":[65],"evidence":[67],"attack":[69],"digital":[70,90],"device":[71,131],"another":[73],"component.":[74],"access":[76],"logs":[77,233],"main":[79],"part":[80],"investigation.":[83,179],"forensic":[85],"offset":[88],"used":[92],"for":[93,103,188],"monitoring":[95],"computer":[99],"traffic":[101],"intended":[102,127],"collecting":[104],"information,":[105],"lawful":[106],"proof":[107],"against":[108],"illegal":[109],"activity,":[110],"intrusion":[112],"detection":[113],"examination":[118],"manages":[119],"unstable":[120],"persuasive":[122],"data.":[123],"The":[124],"project":[125],"deliver":[129],"relying":[132],"upon":[133],"point":[135],"view":[137],"Virtual":[142],"Canters.":[144],"Proposed":[145],"methodology":[146],"based":[148,198],"ELK":[150],"Stack":[151],"(Elasticsearch,":[152],"Logstash,":[153],"Kibana)":[155],"Machine":[164],"learning":[165],"Techniques":[166],"automate":[168],"cron":[170],"job":[171],"process.":[172],"It":[173],"additionally":[174],"helps":[175],"law":[177],"requirement":[178],"center":[181,238],"using":[183,200],"virtual":[184,208],"networks":[185],"have":[186,239],"problem":[187],"real":[192],"time":[193,196],"stamp":[197],"approaches.":[203],"data-center":[209],"art":[212],"science":[214],"seeking":[215],"make":[217],"sense":[218],"out":[219],"computer-":[221],"generated":[222,245],"records.":[223],"process":[229],"suspected":[232],"huge":[240],"amount":[241],"file":[244],"Esxi":[246],"server,":[247],"VCenter,":[248],"VMware.":[249]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
