Treffer: 10A VPN Security Log Management and Visualization System.

Title:
10A VPN Security Log Management and Visualization System.
Authors:
Onah, Fidelis I.1 ikonah80@yahoo.com, Ukoha, Samuel2 samuelukoha2022@gmail.com
Source:
IUP Journal of Telecommunications. Feb2025, Vol. 17 Issue 1, p54-74. 21p.
Database:
Business Source Premier

Weitere Informationen

As multiple log files are produced from an increasing number of network devices and applications in today's data-driven world, extracting valuable information from varied sources and application protocols in real-time is a growing concern. This study provides a thirdparty utility program to collect, prioritize, transmit, compress, delete, archive, store and analyze anonymized log data emanating from user-owned laptops, servers, firewalls, routers, databases and business applications throughout the network. The user interfaces were created using Javafx. Java programming language interfaced with Python was used for the logical parts, and H2 development tool was used for the database. The application supports the operating systems' logging and alerting mechanisms. It incorporates a visualization tool for searching, correlating, alerting and analysis of timestamped company log data. Since all log messages are stored in the same place and not on different devices, interpretation of data takes less time, effort and money. The digital fingerprints also enable network administrators, supervisors, decision makers and regulatory agencies to better visualize network operations, detect problems within the network and block security breaches. Log profiles, over time, can be viewed and assessed via a more human-readable format, such as graphs, charts or tables, which can be exported to a spreadsheet for further manipulation. These presentations are obviously crucial for real-time forensic investigation, regulatory compliance and audit trailing. [ABSTRACT FROM AUTHOR]

Copyright of IUP Journal of Telecommunications is the property of IUP Publications and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)