FUSE-based Syslog Agent for File Access Log
نویسندگان
چکیده
منابع مشابه
File and Task Abstraction in Task Workflow Patterns for File Recommendation Using File-Access Log
The numbers of files in file systems have increased dramatically in recent years. Office workers spend much time and effort searching for the documents required for their jobs. To reduce these costs, we propose a new method for recommending files and operations on them. Existing technologies for recommendation, such as collaborative filtering, suffer from two problems. First, they can only work...
متن کاملIdentifying User Behavior by Analyzing Web Server Access Log File
Web usage mining is application of data mining techniques to discover usage patterns from web data, in order to better serve the needs of web based applications. The user access log files present very significant information about a web server. This paper is concerned with the in-depth analysis of Web Log Data of NASA website to find information about a web site, top errors, potential visitors ...
متن کاملDistributed Secure Virtual File System Using FUSE
In this paper, we describe the implementation and evaluation of the distributed secure file system based on FUSE. A tremendous amount of content is now saved on file servers. File servers and network storage can also easily be installed in small organizations by using operating systems such as Linux. However, the storage capacity of PCs that are generally used is also increasing due to low-pric...
متن کاملLog File Anomaly Detection
Analysis of log files pertaining to a failed run can be a tedious task, especially if the file runs into thousands of lines. Using the recent development in text analysis using deep neural networks, we present a method to reduce effort needed to analyze the log file by highlighting the most probably useful text in the failed log file, which can assist in debugging the causes of the failure. In ...
متن کاملSyslog-sign Protocol Syslog-sign Protocol
This document describes syslog-sign, a mechanism for adding origin authentication, message integrity, replay-resistance, message sequencing, and detection of missing messages to syslog. The goal of Kelsey Expires November 2001 [1] Syslog-sign Protocol June 2001 syslog-sign is to provide all these security features in a way that has minimal requirements and minimal impact on existing syslog impl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Academia-Industrial cooperation Society
سال: 2016
ISSN: 1975-4701
DOI: 10.5762/kais.2016.17.7.623