A survey on OS Logs Analysis Techniques
Harsha Gondhalekar
, Mansi Thanki , Jayashree Ahire , Vaishnavi Londhe
OS logs, Tamper detection, Event Correlation, Anomaly Detection
Computer forensics process uses log file data in finding electronic evidence for criminal investigations. The most important sources of digital evidence for forensic investigation are the event logs because they record each activity performed by the user, application software, or operating systems. An event log can be used as evidence in court. Various forms of digital evidence include the browsing history, chat logs, authentication log files, and deleted files or images. Therefore, methods to maintain the integrity of logs and to detect any modification are important. In this paper, we present a review of techniques used for Tamper detection of OS logs, Anomaly Detection of OS logs and Event Correlation of OS logs.
"A survey on OS Logs Analysis Techniques", IJSDR - International Journal of Scientific Development and Research (www.IJSDR.org), ISSN:2455-2631, Vol.5, Issue 5, page no.248 - 251, May-2020, Available :https://ijsdr.org/papers/IJSDR2005043.pdf
Volume 5
Issue 5,
May-2020
Pages : 248 - 251
Paper Reg. ID: IJSDR_191749
Published Paper Id: IJSDR2005043
Downloads: 000347266
Research Area: Engineering
Country: NASHIK, MAHARASHTRA, India
ISSN: 2455-2631 | IMPACT FACTOR: 9.15 Calculated By Google Scholar | ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 9.15 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publisher: IJSDR(IJ Publication) Janvi Wave