منابع مشابه
Formal Analysis of Log Files
Runtime verification as a field faces several challenges. One key challenge is how to keep the overheads associated with its application low. This is especially important in real-time critical embedded applications, where memory and CPU resources are limited. Another challenge is that of devising expressive and yet user-friendly specification languages that can attract software engineers. In th...
متن کاملTowards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make the Internet a treasure trove of personal information regarding individual Web users. This has lead to internet users voicing concerns over the loss and violation of privacy. Inspired by the Hippocratic Oath, Agrawal, ...
متن کاملPseudonymizing Unix Log Files
Unix systems in many cases record personal data in log files. We present tools that help in practice to retrofit privacy protection into existing Unix audit systems. Our tools are based on an approach to pseudonymizing Unix log files while balancing user requirements for anonymity and the service provider’s requirements for accountability. By pseudonymizing identifying data in log files the ass...
متن کاملForensic examination of log files
Forensic examination of logs plays a big role in modern computer security, but it has become a time consuming and daunting task due to the sheer amount of data involved. It is therefore necessary to make specialized tools to aid the investigation, so that the digital evidence can be extracted in a fast and efficient manner. In this thesis a system is developed that can identify malicious traffi...
متن کاملImproving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patterns of system features that describe program and user behavior. Server systems customarily write comprehensive activity logs whose value is useful in detecting intrusion. Unfortunately, production volumes overwhelm th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Aerospace Computing, Information, and Communication
سال: 2010
ISSN: 1542-9423
DOI: 10.2514/1.49356