Indexed by:
Abstract:
As a data source, log files recorded the basic contents of intrusion detection system. The most popular and effective way to perform host-based intrusion detection is to audit log data and take some effective measures to decrease the loss. Integrating original log analyzing technique with mobile-agent, LASL implements a host-based log analyzing system. Compared with other log analyzing tools, LASL has intellectualized, automatic and distributed characters.
Keyword:
Reprint Author's Address:
Email:
Source :
Journal of Beijing University of Technology
ISSN: 0254-0037
Year: 2005
Issue: 4
Volume: 31
Page: 420-422
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 7
Affiliated Colleges: