2010 2nd IEEE International Conference on Information Management and Engineering 2010
DOI: 10.1109/icime.2010.5477784
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and implement of PIX firewall syslog log

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Early work on the study of logs focused on statistical modeling of errors and failure prediction based on the models. Gu Zhaojun [3] implemented a log analysis system which gathered and pretreated syslog logs generated by PIX firewall, then carried on the TopN statistical analysis and detected security events for realizing the effective surveillance on the network behavior. Karel Slavicek [4] described mathematical methods that are trying to be used for syslog message processing.…”
mentioning
confidence: 99%
“…Early work on the study of logs focused on statistical modeling of errors and failure prediction based on the models. Gu Zhaojun [3] implemented a log analysis system which gathered and pretreated syslog logs generated by PIX firewall, then carried on the TopN statistical analysis and detected security events for realizing the effective surveillance on the network behavior. Karel Slavicek [4] described mathematical methods that are trying to be used for syslog message processing.…”
mentioning
confidence: 99%