2021
DOI: 10.48129/kjs.v48i3.10624
|View full text |Cite
|
Sign up to set email alerts
|

Audit Logs Management and Security - A Survey

Abstract: Audit logs are key resources that show the current state of the systems and user activities and are used for cyber forensics and maintenance. These logs are the only source that can help in finding traces of some malicious activities or troubleshooting a system failure. Insight view for troublefree availability of computing resources and performance monitoring and meaningful forensic audit depends on the management and archival system of audit logs. These logs are prone to multidimensional threats and superuse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
3

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 38 publications
0
4
0
3
Order By: Relevance
“…Audit logs and monitoring play a crucial role in detecting and responding to potential security breaches ( Yang et al, 2021 ). By monitoring access logs and system activities, organizations can identify suspicious behavior and take prompt action ( Ali, Ahmed & Khan, 2021 ). Fraud analytics, an emerging field, utilizes advanced data analytics techniques to detect and prevent fraudulent activities ( Ai et al, 2022 ).…”
Section: Discussionmentioning
confidence: 99%
“…Audit logs and monitoring play a crucial role in detecting and responding to potential security breaches ( Yang et al, 2021 ). By monitoring access logs and system activities, organizations can identify suspicious behavior and take prompt action ( Ali, Ahmed & Khan, 2021 ). Fraud analytics, an emerging field, utilizes advanced data analytics techniques to detect and prevent fraudulent activities ( Ai et al, 2022 ).…”
Section: Discussionmentioning
confidence: 99%
“…Attacks, in turn, are actions taken by threat sources who use tools or techniques to exploit vulnerabilities to damage a system or interfere with its operations. The main security attacks against monitoring solutions are divided into four groups, as defined in [9] and, in addition, we considered a fifth group, as suggested in [1]:…”
Section: Container Mechanismmentioning
confidence: 99%
“…Figure 8 gives a general overview of the transaction flow in the Hyperledger Fabric blockchain environment. First, a collector receives the event data from Docker and generates a signed transaction sending it to the endorsing peers (1). The endorsing peers execute the received transaction, sign it, and send it to the orderer nodes (2).…”
Section: Couchdb Event2ledger Collectormentioning
confidence: 99%
“…Dalam era digital yang terus berkembang, ketersediaan dan pelacakan data menjadi semakin esensial, terutama dalam konteks institusi pendidikan yang memegang peran penting dalam mencetak generasi penerus [1], [2]. Pengelolaan data menjadi jantung dari sistem informasi akademik modern, di mana logging data telah menjadi sarana utama untuk mencatat setiap aktivitas yang terjadi di dalamnya.…”
Section: Pendahuluanunclassified
“…Dalam menghadapi kompleksitas dan dinamika dunia pendidikan saat ini, institusi pendidikan perlu mempertimbangkan implementasi Monitoring Log System sebagai langkah proaktif dalam menjaga integritas dan keamanan data. Sistem ini tidak hanya menyediakan lapisan pertahanan tambahan terhadap ancaman keamanan, tetapi juga membantu mengurangi risiko pelanggaran data yang dapat merugikan integritas institusi [2]- [4].…”
Section: Pendahuluanunclassified