INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
Computer forensics process uses log file data in finding electronic evidence for criminal investigations. The most important sources of digital evidence for forensic investigation are the event logs because they record each activity performed by the user, application software, or operating systems. An event log can be used as evidence in court. Various forms of digital evidence include the browsing history, chat logs, authentication log files, and deleted files or images. Therefore, methods to maintain the integrity of logs and to detect any modification are important. In this paper, we present a review of techniques used for Tamper detection of OS logs, Anomaly Detection of OS logs and Event Correlation of OS logs.
Keywords:
OS logs, Tamper detection, Event Correlation, Anomaly Detection
Cite Article:
"A survey on OS Logs Analysis Techniques", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.5, Issue 5, page no.248 - 251, May-2020, Available :http://www.ijsdr.org/papers/IJSDR2005043.pdf
Downloads:
000337067
Publication Details:
Published Paper ID: IJSDR2005043
Registration ID:191749
Published In: Volume 5 Issue 5, May-2020
DOI (Digital Object Identifier):
Page No: 248 - 251
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn