作者: Pallavi Ramteke , Yashpal Kadam , Sanket Gupta
DOI:
关键词:
摘要: One approach to protected systems is from first last the examination of audit trails or logs. An trail a evidence all procedures that take place in system and across network, it provides outline user/system events so safety measures can be associated actions specific individual element. In optimum path evaluation process working with log generated by our data format, a different kinds processes accessed during user session .our proposed work based on concept forensic activities mining, where we introduce new analysis method which discover what users next application. Keywords - Audit Logs, reference graph building,forensic,optimum evaluation, mining.