Logging Recommendations for Internet-Facing Servers

نویسندگان

  • Alain Durand
  • Igor Gashinsky
  • Donn Lee
  • Scott Sheppard
چکیده

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Forensic Logging System Based on a Secure OS

This paper describes a forensic logging system that collects fine-grained trace evidence from target servers and networks. To provide a more reliable and efficient forensic logging system, we developed a dedicated network processor that collects network traffic and a hardened TCSEC-B1 level secure operating system. The system also is capable of defending servers from malicious attacks as well a...

متن کامل

Enforcing Database Recoverability on Disks that Lack Write-Through

Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on Write-Ahead Logging (WAL) protocol which requires that log records be durably written prior to the corresponding data changes. Database systems use the write-through capability of the storage media to enforce write-ahead logging. While SCSI disks tha...

متن کامل

Consistency of Databases on Commodity Disk Drives

Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) protocol which requires that log records be written durably prior to the corresponding data changes. In order to enforce WAL, database systems rely on the write-through capability of the storage media. While SCSI disks t...

متن کامل

An Evaluation of Caching Strategies for Clustered Web Servers

II Declaration I declare that the work described in this dissertation is, except where otherwise stated, entirely my own work and has not been submitted as an exercise for a degree at this or any other university. Abstract The exponential growth of the Internet and the increasing demands put upon Web servers has created the need for a scalable clustered Web servers. In this paper we attempt to ...

متن کامل

The Role of Internet in Elections (A case study of the Presidential Election of the USA in 2008)

Internet has found an increasing role in the politics, during the last decade. Today, terms like digital democracy, Internet elections, Internet advertisements (propaganda, social- political Web logging in the internet has become common terms.  Internet is getting replaced for the traditional media in politics. The interactive characteristic of this media has changed it to an unrivaled instrume...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • RFC

دوره 6302  شماره 

صفحات  -

تاریخ انتشار 2011