Analysis and implement of PIX firewall Syslog log

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Useful information concerning with the network running status is included in logs generated by firewall, but analyzing large quantity data is very difficult. Therefore, based on Cisco PIX firewall, this paper gathered Syslog logs by employing the thread pool technique, then filtered and categorized them with key words, and finally stored them with format. Through the TopN statistics analysis, research and detection on security event based on feature, it realizes monitoring effectively the network traffic, application service, user behavior and running status, and it also provides the basis of network management and security strategy design for administrator, thereby strengthens further network management. © 2010 IEEE.

Cite

CITATION STYLE

APA

Zhaojun, G., Yong, L., & Wenjing, N. (2010). Analysis and implement of PIX firewall Syslog log. In ICIME 2010 - 2010 2nd IEEE International Conference on Information Management and Engineering (Vol. 1, pp. 185–189). https://doi.org/10.1109/ICIME.2010.5477784

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free