Log file monitors-information security, Computer Network Security

LOG FILE MONITORS

Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Patterns which signify the attack are much easier to identify when entire network and its systems are viewed holistically. It requires allocation of considerable resources since it will involve the collection, movement, storage, and analysis of large quantities of log data.

Posted Date: 10/9/2012 3:49:07 AM | Location : United States







Related Discussions:- Log file monitors-information security, Assignment Help, Ask Question on Log file monitors-information security, Get Answer, Expert's Help, Log file monitors-information security Discussions

Write discussion on Log file monitors-information security
Your posts are moderated
Related Questions
IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look


Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page