Design of a Log Server for Distributed and Large-Scale Server Environments

作者: Attila Özgit , Burak Dayıoğlu , Erhan Anuk , İnan Kanbur , Ozan Alptekin

DOI: 10.1007/978-3-540-39737-3_110

关键词: Web log analysis softwareComputer scienceLog shippingPublic key certificateAudit trailAuditOperating system

摘要: Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as major requirement, well challenge for enterprise-scale computing environments. To ease these tasks, to provide central management facility, software-suit, named “Log-Hunter” has been developed. Log-Hunter is secure log server system which involves collection consolidation large-scale environment having hosts that keeps at least one trail. This architecture also eases the inspection monitoring generated on hosts. By consolidating all centralized server, it significantly reduces manpower provides entries becomes necessary. paper presents functional specifications, some preliminary performance results Log-Hunter.

参考文章(7)
Stephen E. Hansen, E. Todd Atkins, Automated System Monitoring and Notification With Swatch usenix large installation systems administration conference. pp. 145- 152 ,(1993)
M. Bishop, A standard audit trail format National information systems security conference, Baltimore, MD (United States), 10-13 Oct 1995. ,(1995)
Bruce Schneier, John Kelsey, Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. recent advances in intrusion detection. ,(1999)
Bruce Schneier, John Kelsey, Secure audit logs to support computer forensics ACM Transactions on Information and System Security. ,vol. 2, pp. 159- 176 ,(1999) , 10.1145/317087.317089
C. J. Antonelli, Peter Honeyman, M. Undy, The Packet Vault: Secure Storage of Network Data ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 103- 109 ,(1999)
Ulf Gustafson, Ulf Lindqvist, Erland Jonsson, Stefan Axelsson, An Approach to UNIX Security Logging 1 ,(1998)
Barbara Gengler, Alarm raised over intrusion detection network Network Security. ,vol. 1999, pp. 5- 6 ,(1999) , 10.1016/S1353-4858(99)90260-X