VPN security log management and visualization system (Record no. 23295)

MARC details
000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250811121712.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250811b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 27023
Author Fidelis, I. Onah
245 ## - TITLE STATEMENT
Title VPN security log management and visualization system
250 ## - EDITION STATEMENT
Volume, Issue number Vol.17(1), Feb
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hyderabad
Name of publisher, distributor, etc. IUP Publications
Year 2024
300 ## - PHYSICAL DESCRIPTION
Pagination 54-74p.
520 ## - SUMMARY, ETC.
Summary, etc. As multiple log files are produced from an increasing number of network devices and applications in today’s data-driven world, extracting valuable information from varied sources and application protocols in real-time is a growing concern. This study provides a thirdparty utility program to collect, prioritize, transmit, compress, delete, archive, store and analyze anonymized log data emanating from user-owned laptops, servers, firewalls, routers, databases and business applications throughout the network. The user interfaces were created using Javafx. Java programming language interfaced with Python was used for the logical parts, and H2 development tool was used for the database. The application supports the operating systems’ logging and alerting mechanisms. It incorporates a visualization tool for searching, correlating, alerting and analysis of timestamped company log data. Since all log messages are stored in the same place and not on different devices, interpretation of data takes less time, effort and money. The digital fingerprints also enable network administrators, supervisors, decision makers and regulatory agencies to better visualize network operations, detect problems within the network and block security breaches. Log profiles, over time, can be viewed and assessed via a more human-readable format, such as graphs, charts or tables, which can be exported to a spreadsheet for further manipulation. These presentations are obviously crucial for real-time forensic investigation, regulatory compliance and audit trailing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4619
Topical term or geographic name entry element EXTC Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 27024
Co-Author Ukoha, Samuel
773 0# - HOST ITEM ENTRY
Title IUP Journal of telecommunications
Place, publisher, and date of publication Hyderabad IUP Publications
International Standard Serial Number 0975-5551
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://iupindia.in/ViewArticleDetails.asp?ArticleID=7758
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     School of Engineering & Technology School of Engineering & Technology Archieval Section 11/08/2025   2025-1293 11/08/2025 11/08/2025 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.