VPN security log management and visualization system

Fidelis, I. Onah

VPN security log management and visualization system - Vol.17(1), Feb - Hyderabad IUP Publications 2024 - 54-74p.

As multiple log files are produced from an increasing number of network devices and applications in today’s data-driven world, extracting valuable information from varied sources and application protocols in real-time is a growing concern. This study provides a thirdparty utility program to collect, prioritize, transmit, compress, delete, archive, store and analyze anonymized log data emanating from user-owned laptops, servers, firewalls, routers, databases and business applications throughout the network. The user interfaces were created using Javafx. Java programming language interfaced with Python was used for the logical parts, and H2 development tool was used for the database. The application supports the operating systems’ logging and alerting mechanisms. It incorporates a visualization tool for searching, correlating, alerting and analysis of timestamped company log data. Since all log messages are stored in the same place and not on different devices, interpretation of data takes less time, effort and money. The digital fingerprints also enable network administrators, supervisors, decision makers and regulatory agencies to better visualize network operations, detect problems within the network and block security breaches. Log profiles, over time, can be viewed and assessed via a more human-readable format, such as graphs, charts or tables, which can be exported to a spreadsheet for further manipulation. These presentations are obviously crucial for real-time forensic investigation, regulatory compliance and audit trailing.


EXTC Engineering
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.