Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (12): 58-60    DOI: 10.11925/infotech.1003-3513.2004.12.14
Current Issue | Archive | Adv Search |
The Function of Log Analysis in Network Security
Jiang Chuanju
(The Library of Shandong Technology University, Zibo 255012,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

Log analysis regard as component part of network security defending system, it plays a very important role in the network security. This paper discusses the significance of logfile introduces several analytical methods for logfile , and points out developing treads of log analysis.

Key wordsLog analysis      Network security      Logfile     
Received: 12 July 2004      Published: 25 December 2004
: 

TP393

 
Corresponding Authors: Jiang Chuanju     E-mail: chjm0097@sdut.edu.cn
About author:: Jiang Chuanju

Cite this article:

Jiang Chuanju. The Function of Log Analysis in Network Security. New Technology of Library and Information Service, 2004, 20(12): 58-60.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.12.14     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I12/58

1  王伟,彭勤科.主机日志分析及其在入侵检测中的应用.计算机工程与应用,2002(13):35-37
2  张慧敏等.入侵检测系统.计算机应用研究,2001(9):38-41
3  吴教育,卢宁等.日志文件的集中管理和分析.电脑开发与应用,2004(5):26-27
4  田盛丰.入侵检测中对系统日志审记信息进行数据挖掘的研究.计算机工程,2002(1):159-161
5  Rebecca Bacel.Intrusion Detection Systems.NIST Special Publication,2000:13-27
6  Terry Escamilla.Intrusion Detection.John Wiley&Sons Inc.New York,1999
7  S Gast.802.11 无线网络权威指南.北京:清华大学出版社,2002:83-93

[1] Zhou Xiang,Zhang Pengyi,Wang Jun. Impacts of Information Browsing Behaviors on Mobile Shopping: Case Study of Commerce APP Click Stream Analysis[J]. 数据分析与知识发现, 2018, 2(4): 1-9.
[2] Chen Runwen,Qiu Yong,Huang Wenbin,Wang Jun. Analyzing Private College Students’ Online Lifestyle with Web-logs[J]. 数据分析与知识发现, 2017, 1(8): 31-38.
[3] Chen He. Using Logstash and ElasticSearch to Achieve Real-time Statistical Analysis of DSpace Logs[J]. 现代图书情报技术, 2015, 31(5): 88-93.
[4] Chen Yong, Li Honglian, Lv Xueqiang. Analysis for the Search Behavior of Web Users[J]. 现代图书情报技术, 2014, 30(12): 10-17.
[5] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[6] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[7] Qin Jian,Javier Calzada Prado. Use of Learning Object Vocabulary in GEM Queries[J]. 现代图书情报技术, 2006, 22(1): 44-46.
[8] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[9] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[10] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[11] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[12] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
[13] Liu Xing. NT服务器的安全维护与故障排除[J]. 现代图书情报技术, 2003, 19(6): 85-87.
[14] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[15] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn