Security

An Evaluation of Log File and Compression Mechanism

Date Added: Apr 2012
Format: PDF

With worldwide development of multi-national company's communication infrastructure required to increase. As the size of these computer networks increases, it becomes more and more difficult to monitor, control, and secure them. Networks consist of a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. Each of these devices produces log files, which need to be analyzed and monitored to provide network security and satisfy regulations. current information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system services and utilities) for multiple purposes (e.g., maintenance, security issues, traffic analysis, legal requirements, software debugging, customer management, user interface usability studies).