Marija Zajeganović, Milan Pavlović, Danica Mamula Tartalja, Silva Kostić
{"title":"An Approach to Improving Network Security Using Log Analysis","authors":"Marija Zajeganović, Milan Pavlović, Danica Mamula Tartalja, Silva Kostić","doi":"10.31410/itema.2022.105","DOIUrl":null,"url":null,"abstract":"Troubleshooting is the process of detecting, identifying and resolving problems within a computer network by means of specific methods, tools and operations. Troubleshooting implies following a set of procedures or steps that conform to the security standards and policies of a company. Diagnosing the source of a problem can be done by tools for system monitoring, recording log messages, manual testing of device configuration, as well as by tools for device operation analysis. The procedure for using log messages to resolve both common problems and those caused by attacks is explained in this paper. Furthermore, this paper describes the way security threat management systems use the contents of log messages to analyze hardware problems and malicious activities.","PeriodicalId":389229,"journal":{"name":"Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31410/itema.2022.105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Troubleshooting is the process of detecting, identifying and resolving problems within a computer network by means of specific methods, tools and operations. Troubleshooting implies following a set of procedures or steps that conform to the security standards and policies of a company. Diagnosing the source of a problem can be done by tools for system monitoring, recording log messages, manual testing of device configuration, as well as by tools for device operation analysis. The procedure for using log messages to resolve both common problems and those caused by attacks is explained in this paper. Furthermore, this paper describes the way security threat management systems use the contents of log messages to analyze hardware problems and malicious activities.