In a large-scale IT infrastructure such as the LHCb Online system many applications are running on thousands of machines producing many GBs of logs every day. Although most of the logs are just routine logs, some of them may indicate an attack, a malfunction or provide vital debugging information. Due to their volume only automatisation of the analysis of the logs can provide us with an efficient way to handle all of these logs, ensuring that even the most rare logs will be processed. We present a centralized logging system which allow us to do in-depth analysis of every log. The description of the architecture includes information from how we integrate logging from many devices to a centralized server using syslog and in particular how a c...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
The first level trigger of LHCb accepts one million events per second. After preprocessing in custom...
Data intensive computing research and technology developments offer the potential of providing signi...
A log is recording a system’s activity, aimed to help system administrator to traceback an attack, f...
History has shown, many times computer logs are the only information an administrator may have for a...
Abstract History has shown, many times computer logs are the only information an administrator may h...
Due to increase in occurrences of intrusion events, organizations are now moving towards implementat...
Data logging is a critical activity and the foundation for several information security related acti...
peer reviewedNowadays, most systems and applications produce log records that are useful for securit...
The Online System of the LHCb experiment at CERN is composed of a very large number of PCs: around 1...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
Abstract—Security log analysis is extremely useful for uncovering intrusions and anomalies. However,...
Abstract: Virtual-machine logging and replay enables system administrators to analyze intrusions mor...
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity an...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
The first level trigger of LHCb accepts one million events per second. After preprocessing in custom...
Data intensive computing research and technology developments offer the potential of providing signi...
A log is recording a system’s activity, aimed to help system administrator to traceback an attack, f...
History has shown, many times computer logs are the only information an administrator may have for a...
Abstract History has shown, many times computer logs are the only information an administrator may h...
Due to increase in occurrences of intrusion events, organizations are now moving towards implementat...
Data logging is a critical activity and the foundation for several information security related acti...
peer reviewedNowadays, most systems and applications produce log records that are useful for securit...
The Online System of the LHCb experiment at CERN is composed of a very large number of PCs: around 1...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
Abstract—Security log analysis is extremely useful for uncovering intrusions and anomalies. However,...
Abstract: Virtual-machine logging and replay enables system administrators to analyze intrusions mor...
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity an...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
The first level trigger of LHCb accepts one million events per second. After preprocessing in custom...
Data intensive computing research and technology developments offer the potential of providing signi...