2016
DOI: 10.1007/978-981-287-988-2_48
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic and Security Event Collecting System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Adopting such an approach shall reduce the confusion associated with the troubleshooting process and reduce the time needed for carrying out this process. Diagnosis and recovery of any problem experienced by a system begins with reviewing the system's log files [2]. These files presents the activity record of the system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Adopting such an approach shall reduce the confusion associated with the troubleshooting process and reduce the time needed for carrying out this process. Diagnosis and recovery of any problem experienced by a system begins with reviewing the system's log files [2]. These files presents the activity record of the system.…”
Section: Introductionmentioning
confidence: 99%
“…That's attributed to the following reasons: (1) Having various types of logs which list messages with low or high severity [6]. In addition, the type of syslog data is represented in unstructured textual data, and there is a variety of formats and a big volume [7], (2) the increasing number of network elements which indicates that there's a massive volume of complex log data, and thus, it's necessary to extract information accurately and efficiently in order to make correct maintenance decisions, and (3) the log format, which depends on each vendor or service [8]. Thus, classifying syslog messages requires having deep domain knowledge of each log format, and the component of each layer and its potential problems.…”
mentioning
confidence: 99%