Explore chapters and articles related to this topic
AnyLog Stable Design Pattern
Published in Mohamed E. Fayad, Stable Design Patterns for Software and Systems, 2017
In computing, a log is a recorded file of events that occur in an operating system or other software processes or that emanate from sending messages from one user to the other. Logging is an intentional act of maintaining or keeping a log. A log file is almost similar to black box recordings of an airline or an aircraft. It can help unfold a sequence of events or process that might have occurred during the normal operation of a computer system. A log is essentially a record of events and it could be used as a guide to suggest future corrective actions that can enhance important performance parameters. AnyLog design pattern is important because it can capture real-time events and help a developer to develop numerous applications that are likely to utilize different features of logs.
A Cloud-Based Secured IoT Framework for Log Management
Published in Kamal Kumar Sharma, Akhil Gupta, Bandana Sharma, Suman Lata Tripathi, Intelligent Communication and Automation Systems, 2021
Nilima Dongre, Mohammad Atique
The internet of things (IoT) consists of a heterogeneous computing environment of both physical and logical entities distributed across its layers, namely, sensor devices and sensor node layer, edge or gateway layer, network layer and cloud layer. At each layer these entities perform numerous operations which are logged continuously. A log can be defined as the traces of the events occurring in a network or within a system of an organization. Logs are produced dynamically and are stored locally and remotely in plain text format.
Network Security Preliminaries
Published in Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody, Software-Defined Networking and Security, 2018
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
Logs are very useful for troubleshooting errors and alert system administrators when critical events detected. Using the alerting built in the logging application system, it will send an email or notify us then to have someone keep watching logs for any changes. There are many error reporting tools available, we can use Sentry, Honeybadger, or Riemann.
Performance Evaluation of the MapReduce-based Parallel Data Preprocessing Algorithm in Web Usage Mining with Robot Detection Approaches
Published in IETE Technical Review, 2022
Mitali Srivastava, Atul Kumar Srivastava, Rakhi Garg, P. K. Mishra
An entry is automatically recorded into the Web server log for every user when they traverse the particular website. Basically, there are four types of server logs that are created by the Web server software: error log, agent log, referrer log, and access log or transfer log. Among them, the access log is the most important type of server log, and it contains all information regarding the activities of the user. This type of server log is widely used in the Web usage mining process. The agent log and referrer log may be added to the access log to create an extended log file format [17]. Due to different setting parameters, various Web servers support different formats of log files such as NCSA Common Log Format (CLF)/Combined Log Format (ECLF), IIS Standard/Extended, Netscape Flexible, and Log Markup Language (LogML). Out of these log formats, CLF is a broadly adopted log format, and ECLF is a customized version of CLF [18]. A formalized data preprocessing problem in ECLF format is given below.
Usability Evaluation of TV Interfaces: Subjective Evaluation Vs. Objective Evaluation
Published in International Journal of Human–Computer Interaction, 2022
Cigdem Altin Gumussoy, Aycan Pekpazar, Mustafa Esengun, Ayse Elvan Bayraktaroglu, Gokhan Ince
Logging or log analysis is the evaluation of audit trail records or logs, which are generated by computer systems, devices, and software in response to some kind of stimuli to make sense of data (Chuvakin et al., 2012). In this study, two logging metrics as keystroke and backspace counts are used. The keystroke count indicates the number of keys of the TV remote control that users click or press while performing tasks. The keystroke count shows how efficiently the user performs the task. The backspace count indicates the number of pressing back keys, which is the key that returns to the previous screen from the user’s screen. The user may try to exit the current screen, thinking that he or she is making a mistake, or try to go back when he or she goes the wrong way.
Recommendations for smart grid security risk management
Published in Cyber-Physical Systems, 2019
Vikas Lamba, Nikola Šimková, Bruno Rossi
(4) Security management is concerned with the formulation and implementation of security policies, deployment of risk management frameworks, periodical audits, and entrusting accountability. Audits can be well used to detect and prevent security breaches by performing the proper analysis of logs.