2008
DOI: 10.1016/s1353-4858(08)70016-3
|View full text |Cite
|
Sign up to set email alerts
|

Turning log files into a security asset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…A log management solution should allow for different types of log messages to be implemented as well as to provide better accountability into the activity seen within the environment [16]. When considering combining an FIM with a log management solution, the following considerations should be made:…”
Section: Combining Fim With Logging Solutionsmentioning
confidence: 99%
“…A log management solution should allow for different types of log messages to be implemented as well as to provide better accountability into the activity seen within the environment [16]. When considering combining an FIM with a log management solution, the following considerations should be made:…”
Section: Combining Fim With Logging Solutionsmentioning
confidence: 99%
“…A typical organization has many network devices that, if configured correctly, can generate and store log files of user activities [8]. In order to make sense of all the data provided in continuous streams by network devices, dedicated logging infrastructures (log file servers) have been developed to support the storage and management of logs [8]. Some of the techniques include console logging, buffered logging, terminal logging, syslog, Simple Network Management Protocol (SNMP) traps and the Authentication, Authorization and Accounting (AAA) protocol [29].…”
Section: Network Log Miningmentioning
confidence: 99%
“…The second layer, called the discovery layer, follows the preparation layer ( Figure 1). In this layer, tests and experiments are carried out on the network devices to identify the digital footprints of the suspects [8]. The goal is to discover a link between the suspects and the incident.…”
Section: Discovery Layermentioning
confidence: 99%
See 2 more Smart Citations