Security Log Analysis


Authors : Allenki Shiva Santosh.

Volume/Issue : Volume 3 - 2018, Issue 9 - September

Google Scholar : https://goo.gl/DF9R4u

Scribd : https://goo.gl/MKAszg

Thomson Reuters ResearcherID : https://goo.gl/3bkzwv

Brutal cyber attacks these days tend to shut down the control systems of all companies and prolonged use of this results in a cyber war. Urge of new security system is required in today security management which is called as Enterprise security management ESM which is a integrated network system comprises of firewall, internet protocol etc. The present security management system has capability of shielding the data from outside sources and all the traffic inflows from outside to inside. The security system suggests that intelligence of security by determining the relation between security and data events from the network system. This mechanism is done by Big data. It also applies Distribution based technology through the security log system. This attacks include active attacks, passive attacks, SQL injection attacks.

Keywords : Big Data, Log analysis, Security, Cyber attack, Trojans and Malwares.

CALL FOR PAPERS


Paper Submission Last Date
30 - April - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe