VPN security log management and visualization system (Record no. 23295)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250811121712.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250811b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 27023 |
| Author | Fidelis, I. Onah |
| 245 ## - TITLE STATEMENT | |
| Title | VPN security log management and visualization system |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.17(1), Feb |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Hyderabad |
| Name of publisher, distributor, etc. | IUP Publications |
| Year | 2024 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 54-74p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | As multiple log files are produced from an increasing number of network devices and applications in today’s data-driven world, extracting valuable information from varied sources and application protocols in real-time is a growing concern. This study provides a thirdparty utility program to collect, prioritize, transmit, compress, delete, archive, store and analyze anonymized log data emanating from user-owned laptops, servers, firewalls, routers, databases and business applications throughout the network. The user interfaces were created using Javafx. Java programming language interfaced with Python was used for the logical parts, and H2 development tool was used for the database. The application supports the operating systems’ logging and alerting mechanisms. It incorporates a visualization tool for searching, correlating, alerting and analysis of timestamped company log data. Since all log messages are stored in the same place and not on different devices, interpretation of data takes less time, effort and money. The digital fingerprints also enable network administrators, supervisors, decision makers and regulatory agencies to better visualize network operations, detect problems within the network and block security breaches. Log profiles, over time, can be viewed and assessed via a more human-readable format, such as graphs, charts or tables, which can be exported to a spreadsheet for further manipulation. These presentations are obviously crucial for real-time forensic investigation, regulatory compliance and audit trailing. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4619 |
| Topical term or geographic name entry element | EXTC Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 27024 |
| Co-Author | Ukoha, Samuel |
| 773 0# - HOST ITEM ENTRY | |
| Title | IUP Journal of telecommunications |
| Place, publisher, and date of publication | Hyderabad IUP Publications |
| International Standard Serial Number | 0975-5551 |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://iupindia.in/ViewArticleDetails.asp?ArticleID=7758 |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 11/08/2025 | 2025-1293 | 11/08/2025 | 11/08/2025 | Articles Abstract Database |