Plagiarism is checked by the leading plagiarism checker
Volume 3 Issue 2
March-April 2025
Author(s) | James Sani |
---|---|
Country | Nigeria |
Abstract | There has been an issue ever since computers were invented, security. Evolving in technology is evolving cybercriminals. Hackers are becoming knowledgeable day by day making it hard for us to handle the security of our machines. Then, the computer-generated records were generated and they are being analyzed to find any anomalies in the computers. These records generated by devices, applications, and networks are then time-sequenced into logs. A log is a record of an event that has occurred in a machine. These logs are not fully documented or consistently formed across applications or devices which can be understood by professionals working with logs, which further builds the case for log analytics. Log analytics helps a normal user get insights into system performance and can indicate possible problems such as hardware failure or any security breaches. To do this, a powerful technique to monitor the computers is used, namely an intrusion detection system. A sub-technique called host-intrusion detection system is used to understand more in detail about a machine, server, or computer. These logs are collected, analyzed, and put out as stats in the form of UI in web applications. This helps the user understand what is happening and to overcome and prevent security issues in an organization. |
Keywords | Wazuh, Network, Security, Attack, Monitoring |
Discipline | Computer > Network / Security |
Published In | Volume 1, Issue 1, July-August 2023 |
Published On | 2023-07-17 |
Cite This | Improved Log Monitoring using Host-based Intrusion Detection System - James Sani - AIJMR Volume 1, Issue 1, July-August 2023. |
E-ISSN 2584-0487
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.