FUSE-based Syslog Agent for File Access Log

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

File and Task Abstraction in Task Workflow Patterns for File Recommendation Using File-Access Log

The numbers of files in file systems have increased dramatically in recent years. Office workers spend much time and effort searching for the documents required for their jobs. To reduce these costs, we propose a new method for recommending files and operations on them. Existing technologies for recommendation, such as collaborative filtering, suffer from two problems. First, they can only work...

متن کامل

Identifying User Behavior by Analyzing Web Server Access Log File

Web usage mining is application of data mining techniques to discover usage patterns from web data, in order to better serve the needs of web based applications. The user access log files present very significant information about a web server. This paper is concerned with the in-depth analysis of Web Log Data of NASA website to find information about a web site, top errors, potential visitors ...

متن کامل

Distributed Secure Virtual File System Using FUSE

In this paper, we describe the implementation and evaluation of the distributed secure file system based on FUSE. A tremendous amount of content is now saved on file servers. File servers and network storage can also easily be installed in small organizations by using operating systems such as Linux. However, the storage capacity of PCs that are generally used is also increasing due to low-pric...

متن کامل

Log File Anomaly Detection

Analysis of log files pertaining to a failed run can be a tedious task, especially if the file runs into thousands of lines. Using the recent development in text analysis using deep neural networks, we present a method to reduce effort needed to analyze the log file by highlighting the most probably useful text in the failed log file, which can assist in debugging the causes of the failure. In ...

متن کامل

Syslog-sign Protocol Syslog-sign Protocol

This document describes syslog-sign, a mechanism for adding origin authentication, message integrity, replay-resistance, message sequencing, and detection of missing messages to syslog. The goal of Kelsey Expires November 2001 [1] Syslog-sign Protocol June 2001 syslog-sign is to provide all these security features in a way that has minimal requirements and minimal impact on existing syslog impl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Academia-Industrial cooperation Society

سال: 2016

ISSN: 1975-4701

DOI: 10.5762/kais.2016.17.7.623