A hybrid approach for log signature generation
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns ca...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Emerald Publishing
2023-01-01
|
Series: | Applied Computing and Informatics |
Subjects: | |
Online Access: | https://www.emerald.com/insight/content/doi/10.1016/j.aci.2019.05.002/full/pdf |