Log files are rich sources of information exhibiting the actions performed during the usage of a computer system in our daily work. In this study we concentrate on parsing/isolating logs from different sources and then clustering the logs using data mining tool (Weka) to filter the unwanted entries in the logs which will greatly help in correlating the events from different logs. Unfortunately parsing heterogeneous logs to extract the attribute values becomes tedious, since every type of log is stored in a proprietary format. We propose a framework that has the ability to parse and isolate a variety of logs, followed by clustering the logs to identify and remove unneeded entries. Experiments involving a range of logs, reveals the fact that ...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
The importance of event logs, as a source of information in systems and network management cannot be...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
The importance of event logs, as a source of information in systems and network management cannot be...
This research was motivated to address the problem of solving the difficulty of distinguishing data ...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Process mining techniques attempt to extract non-trivial and useful information from event logs reco...
Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate...