“…A typical organization has many network devices that, if configured correctly, can generate and store log files of user activities [8]. In order to make sense of all the data provided in continuous streams by network devices, dedicated logging infrastructures (log file servers) have been developed to support the storage and management of logs [8]. Some of the techniques include console logging, buffered logging, terminal logging, syslog, Simple Network Management Protocol (SNMP) traps and the Authentication, Authorization and Accounting (AAA) protocol [29].…”