WEB APPLICATION FOR SEARCHING WINDOWS EVENT LOGS
DOI:
https://doi.org/10.24867/25BE41CickovicKeywords:
Windows, Event log, collecting, searching, filteringAbstract
This paper provides an overview of the theoretical foundations about event logging on Windows operating system. An application for collecting, searching and filtering event logs in local network has been implemented and described as part of this paperwork, as well.
References
[1] Nicoleta Stanciu , “ Importance of event log management to ensure information system security”, Academy of Economic Studies, Bucharest, 2013.
[2] Zhuangbin Chen, Jinyang Liu Wenwei Gu, Yuxin Su, Jieming Zhu, Yongqiang Yang, Michael R. Lyu “ Deep Learning-based System Log Analysis for Anomaly Detection“, Januray 2022.
[3] GSEC Practical Assignment, „Importance of Event Logging“, SANS institute, 2003
[4] https://www.blumira.com/what-are-event-logs-and-why-do-they-matter/ (pristupljeno u junu 2023.)
[5] Marcello Cinque, Raffaele Della Corte, Antonio Pecchia, „Contextual filtering and prioritization of computer application logs for security situational awareness“, 2020
[6] Risto Vaarandi, „Tools and techniques for event log analysis“, Tallin Universitz of Technology, 2005
[7] Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han, „Computer operating system logging and security issues: a survey“, 2016
[8] Vanja M. Korać, „Digitalna forenzika u funkciji zaštite informacionog sistema baziranog na Linux i Windows platformama“, Univerzitet u Beogradu, 2014
[9] https://www.odseknis.akademijanis.edu.rs/wp-content/plugins/vtspredmeti/uploads/1585731723ARM%20Predavanje%2010%202016.pdf?script=lat (pristupljeno u junu 2023.)
[2] Zhuangbin Chen, Jinyang Liu Wenwei Gu, Yuxin Su, Jieming Zhu, Yongqiang Yang, Michael R. Lyu “ Deep Learning-based System Log Analysis for Anomaly Detection“, Januray 2022.
[3] GSEC Practical Assignment, „Importance of Event Logging“, SANS institute, 2003
[4] https://www.blumira.com/what-are-event-logs-and-why-do-they-matter/ (pristupljeno u junu 2023.)
[5] Marcello Cinque, Raffaele Della Corte, Antonio Pecchia, „Contextual filtering and prioritization of computer application logs for security situational awareness“, 2020
[6] Risto Vaarandi, „Tools and techniques for event log analysis“, Tallin Universitz of Technology, 2005
[7] Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han, „Computer operating system logging and security issues: a survey“, 2016
[8] Vanja M. Korać, „Digitalna forenzika u funkciji zaštite informacionog sistema baziranog na Linux i Windows platformama“, Univerzitet u Beogradu, 2014
[9] https://www.odseknis.akademijanis.edu.rs/wp-content/plugins/vtspredmeti/uploads/1585731723ARM%20Predavanje%2010%202016.pdf?script=lat (pristupljeno u junu 2023.)
Downloads
Published
2023-12-06
Issue
Section
Electrotechnical and Computer Engineering