📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 5, MAY 2017

Vulnerability Signatures and Log Analysis: A Survey

Poornima .M, Ramakrishna M.V

DOI: 10.17148/IJARCCE.2017.6512

Abstract: Computer security has become a major concern of modern technological era and the history of security leads to a better understanding of emergence of security technology. One such field is concerned with protecting computer assets from attackers. Logs contain a huge wealth of information. Logs provides a sight of running system. Vulnerability is a kind of bug used by an attacker .log analysis for system security could be signature based or anomaly based. Both of these signatures are could either be network based or host based. In this paper a survey is done to study the current practices in generation of vulnerability signatures and analysis of logs.



Keywords: Logs, vulnerability signature, anomaly signatures, network based, host based.

How to Cite:

[1] Poornima .M, Ramakrishna M.V, “Vulnerability Signatures and Log Analysis: A Survey,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.6512