Abstract: Computer security has become a major concern of modern technological era and the history of security leads to a better understanding of emergence of security technology. One such field is concerned with protecting computer assets from attackers. Logs contain a huge wealth of information. Logs provides a sight of running system. Vulnerability is a kind of bug used by an attacker .log analysis for system security could be signature based or anomaly based. Both of these signatures are could either be network based or host based. In this paper a survey is done to study the current practices in generation of vulnerability signatures and analysis of logs.

Keywords: Logs, vulnerability signature, anomaly signatures, network based, host based.