Download Now Free registration required
In the cyber crime investigation, log files are an important source of evidence. The importance of event logs, as a source of information in systems and network management cannot be over accentuated. With the ever-increasing size and complexity of today's event logs, the task of analyzing event logs has become cumbrous to carry out manually. Now these days recent research has focused on the automatic analysis of these logs files in order to identify suspicious user. This paper through some light on those techniques by which it will easy to retrieve the suspicious user using log files. This paper also shows about web mining and Markov model.
- Format: PDF
- Size: 657.5 KB