Exploring the use of LLMs to analyse/summarise security logs

dc.contributor.advisorWilliam, Seymour
dc.contributor.authorAlgoblan, Faisal
dc.date.accessioned2025-12-24T10:54:01Z
dc.date.issued2025
dc.description.abstractSecurity and system logs are key to modern cybersecurity and IT operations. However, their scale and complexity put a lot of pressure on analysts. Large language models (LLMs) offer new ways to summarise and interpret logs, but their use raises questions about trust, risk, and governance. This project set out to explore how practitioners perceive the role of LLMs in operational security and what safeguards they believe are necessary for safe adoption. Eight semi-structured interviews were carried out with professionals who had experience in log analysis, including SOC Manager and analysts, IT administrators, and students with relevant backgrounds. The transcripts were analysed using Braun and Clarke’s thematic analysis [5], resulting in four themes: Workflow Integration and Guardrails; Trust, Verification, and Evidence; Privacy and Data Governance; and Adoption and Organisational Readiness. Findings show that practitioners see value in combining LLMs with existing tools like SIEM platforms, alert triage workflows, and ticketing systems. They stressed that human oversight is vital. Prompts must be carefully structured, and outputs need supporting evidence before they can be trusted. Privacy concerns were significant, with requests for local hosting, strict access controls, data minimization, and clear audit policies. Adoption relied on training, cultural readiness, and a clear return on investment. The study contributes by offering a practitioner-centred view of LLM use in cybersecurity, filling a gap in the literature that has mainly focused on technical benchmarks. It concludes that LLMs can support efficiency and improve understanding in log analysis, but only when integrated into workflows that enforce verification, protect privacy, and ensure clear accountability.
dc.format.extent39
dc.identifier.urihttps://hdl.handle.net/20.500.14154/77694
dc.language.isoen
dc.publisherSaudi Digital Library
dc.subjectCybersecurity
dc.subjectSecurity Log Analysis
dc.subjectSystem Logs
dc.subjectLarge Language Models (LLMs)
dc.subjectArtificial Intelligence in Cybersecurity
dc.subjectSecurity Operations Center (SOC)
dc.subjectLog Summarisation
dc.subjectHuman–Computer Interaction
dc.subjectTrust and Verification
dc.subjectData Privacy and Governance
dc.subjectAI Governance
dc.subjectThematic Analysis
dc.subjectQualitative Researchx
dc.subjectOperational Security
dc.subjectAutomation in Security Operations
dc.titleExploring the use of LLMs to analyse/summarise security logs
dc.typeThesis
sdl.degree.departmentDepartment of Informatics
sdl.degree.disciplineCyber Security
sdl.degree.grantorKing's College London
sdl.degree.nameMaster of Science

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
SACM-Dissertation.pdf
Size:
581.82 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed to upon submission
Description:

Copyright owned by the Saudi Digital Library (SDL) © 2026