2016
DOI: 10.1002/sec.1677
|View full text |Cite
|
Sign up to set email alerts
|

Computer operating system logging and security issues: a survey

Abstract: Logging has become a fundamental feature within the modern computer operating systems because of the fact that logging may be used through a variety of applications and fashion, such as system tuning, auditing, and intrusion detection systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 27 publications
0
8
0
1
Order By: Relevance
“…Khan et al [75] focused on logs in the cloud computing environment and the logs were leveraged for identifying and preventing suspicious attacks. Zeng et al [155] studied the logging mechanisms and security issues in three computer operating systems. A recent publication [79] reviewed clustering based approaches in cyber security applications.…”
Section: Survey Methodologymentioning
confidence: 99%
“…Khan et al [75] focused on logs in the cloud computing environment and the logs were leveraged for identifying and preventing suspicious attacks. Zeng et al [155] studied the logging mechanisms and security issues in three computer operating systems. A recent publication [79] reviewed clustering based approaches in cyber security applications.…”
Section: Survey Methodologymentioning
confidence: 99%
“…Both the Linux and Windows kernels are designed differently and there is a large Windows application installed base and therefore it is of interest to know the comparative security strengths and weaknesses between the two. So far, most of the security analysis of the Windows and Linux operating systems were carried out several years ago and were considered out-dated [167], [153], [132], [9], [168].…”
Section: Future Research Directionsmentioning
confidence: 99%
“…Prevention of Malice Software a 12 Media Processing and Security a 13 Operation Program and Duty a 14 Network Management a 15 Information and Software, Hardware Exchange a 21 Management of Network Access a 22 Management of User's Access a 23 Management of Application Access a 24 System Access and Monitoring of Usage a 31 Effect on Tangible Assets a 32 Effect on Intangible Assets…”
Section: Criteria Description Of the Criteriamentioning
confidence: 99%
“…Besides, many studies have researched the security of computer networks because of the emergence of a large number of cyber crimes, which are researched in many studies [9,10]. To combat cyber crimes vigorously, studies regarding computer forensics [11,12], virus prevention technologies [13], security visualization for computer network logs [14], intrusion detection [15], etc., have been performed in recent years. In addition, approaches of computer network security risk assessment are also of great significance to improve computer network security.…”
Section: Introductionmentioning
confidence: 99%