{"title":"保护主机系统的日志部门","authors":"Pavitra Chauhan, Nikita Singh, N. Chandra","doi":"10.1109/CICN.2013.80","DOIUrl":null,"url":null,"abstract":"Logs are the files which contain the information about all the events occurring on the system. Logs have been playing a vital role in providing all kinds of information which can be used for several purposes like detecting a suspicious behaviour over the system. The aim of this paper is to study, analyse and generate results by observing host. Log files consist of different header information which can be further used to determine if any kind of malicious activity is discovered then that activity can be traced and blocked.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Deportment of Logs for Securing the Host System\",\"authors\":\"Pavitra Chauhan, Nikita Singh, N. Chandra\",\"doi\":\"10.1109/CICN.2013.80\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Logs are the files which contain the information about all the events occurring on the system. Logs have been playing a vital role in providing all kinds of information which can be used for several purposes like detecting a suspicious behaviour over the system. The aim of this paper is to study, analyse and generate results by observing host. Log files consist of different header information which can be further used to determine if any kind of malicious activity is discovered then that activity can be traced and blocked.\",\"PeriodicalId\":415274,\"journal\":{\"name\":\"2013 5th International Conference on Computational Intelligence and Communication Networks\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Computational Intelligence and Communication Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN.2013.80\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2013.80","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Logs are the files which contain the information about all the events occurring on the system. Logs have been playing a vital role in providing all kinds of information which can be used for several purposes like detecting a suspicious behaviour over the system. The aim of this paper is to study, analyse and generate results by observing host. Log files consist of different header information which can be further used to determine if any kind of malicious activity is discovered then that activity can be traced and blocked.