WEB APLIKACIJA ZA PRETRAGU WINDOWS LOGOVA
Ključne reči:
Log događaja, Windows, prikupljanje, pretraga, filtriranje
Apstrakt
Rad pruža pregled teorijskih osnova u oblast logova događaja na Windows operativnom sistemu. Takođe, u okviru ovog rada implementirana je i detaljno opisana aplikacija za prikupljanje, pretragu i filtriranje logova događaja unutar lokalne mreže.
Reference
[1] Nicoleta Stanciu , “ Importance of event log management to ensure information system security”, Academy of Economic Studies, Bucharest, 2013.
[2] Zhuangbin Chen, Jinyang Liu Wenwei Gu, Yuxin Su, Jieming Zhu, Yongqiang Yang, Michael R. Lyu “ Deep Learning-based System Log Analysis for Anomaly Detection“, Januray 2022.
[3] GSEC Practical Assignment, „Importance of Event Logging“, SANS institute, 2003
[4] https://www.blumira.com/what-are-event-logs-and-why-do-they-matter/ (pristupljeno u junu 2023.)
[5] Marcello Cinque, Raffaele Della Corte, Antonio Pecchia, „Contextual filtering and prioritization of computer application logs for security situational awareness“, 2020
[6] Risto Vaarandi, „Tools and techniques for event log analysis“, Tallin Universitz of Technology, 2005
[7] Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han, „Computer operating system logging and security issues: a survey“, 2016
[8] Vanja M. Korać, „Digitalna forenzika u funkciji zaštite informacionog sistema baziranog na Linux i Windows platformama“, Univerzitet u Beogradu, 2014
[9] https://www.odseknis.akademijanis.edu.rs/wp-content/plugins/vtspredmeti/uploads/1585731723ARM%20Predavanje%2010%202016.pdf?script=lat (pristupljeno u junu 2023.)
[2] Zhuangbin Chen, Jinyang Liu Wenwei Gu, Yuxin Su, Jieming Zhu, Yongqiang Yang, Michael R. Lyu “ Deep Learning-based System Log Analysis for Anomaly Detection“, Januray 2022.
[3] GSEC Practical Assignment, „Importance of Event Logging“, SANS institute, 2003
[4] https://www.blumira.com/what-are-event-logs-and-why-do-they-matter/ (pristupljeno u junu 2023.)
[5] Marcello Cinque, Raffaele Della Corte, Antonio Pecchia, „Contextual filtering and prioritization of computer application logs for security situational awareness“, 2020
[6] Risto Vaarandi, „Tools and techniques for event log analysis“, Tallin Universitz of Technology, 2005
[7] Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han, „Computer operating system logging and security issues: a survey“, 2016
[8] Vanja M. Korać, „Digitalna forenzika u funkciji zaštite informacionog sistema baziranog na Linux i Windows platformama“, Univerzitet u Beogradu, 2014
[9] https://www.odseknis.akademijanis.edu.rs/wp-content/plugins/vtspredmeti/uploads/1585731723ARM%20Predavanje%2010%202016.pdf?script=lat (pristupljeno u junu 2023.)
Objavljeno
2023-12-06
Sekcija
Elektrotehničko i računarsko inženjerstvo