Log file monitors-information security, Computer Network Security

LOG FILE MONITORS

Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Patterns which signify the attack are much easier to identify when entire network and its systems are viewed holistically. It requires allocation of considerable resources since it will involve the collection, movement, storage, and analysis of large quantities of log data.

Posted Date: 10/9/2012 3:49:07 AM | Location : United States







Related Discussions:- Log file monitors-information security, Assignment Help, Ask Question on Log file monitors-information security, Get Answer, Expert's Help, Log file monitors-information security Discussions

Write discussion on Log file monitors-information security
Your posts are moderated
Related Questions
To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o