Centralized Management and Processing Policy for Log Files
The management mechanism for log files is important when we establish the policy of network information security, since the log files record users activities on systems and network, playing an important role in network security. This paper analyzes the effects and features of the log files, and presents an integrated policy to process and administrate them. Some methods to analyze the log files are also introduced.
log files network security intrusion activity integrality safeguard
Qiao-Ping SUNI Xiao-Ming ZHAO
Department of Computer,Taizhou University,Taizhou,Zhejiang 317000,P.R.China;Department of Computer S Department of Computer,Taizhou University,Taizhou,Zhejiang 317000,P.R.China
国际会议
2006 International Conference on Management Science and Engineering(2006管理科学与工程国际学术研讨会)
武汉
英文
1254-1257
2006-11-08(万方平台首次上网日期,不代表论文的发表时间)