Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Audit Trail

IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research
© 2019 by IJCA Journal
ICAIM 2017 - Number 2
Year of Publication: 2019
Priyanka Nikalje
Gauresh Lotlikar
Manish Mishra
Shirshendu Maitra

Priyanka Nikalje, Gauresh Lotlikar, Manish Mishra and Shirshendu Maitra. Article: Audit Trail. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(2):9-11, February 2019. Full text available. BibTeX

	author = {Priyanka Nikalje and Gauresh Lotlikar and Manish Mishra and Shirshendu Maitra},
	title = {Article: Audit Trail},
	journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research},
	year = {2019},
	volume = {ICAIM 2017},
	number = {2},
	pages = {9-11},
	month = {February},
	note = {Full text available}


In today's IT world computer systems are vulnerable by both insiders (i. e. employees) as well as penetration by outsiders (or attackers). Also there are evidences showing the growing number of incidents reported in the press for such abuse. Closing all security loopholes from today's system is infeasible, whereas no combination of technologies can prevent legitimate users from abusing their authority in a system, auditing in viewed as the last line of defense. But auditing a large amount of data is not a feasible option hence what is needed is automated tools to analyze the vast amount of audit data for suspicious user behavior. This paper presents audit trail analysis technique and intrusion detection systems that have emerged in the past several years.


  • http://www. academypublisher. com/proc/isnns10/paper/isnns10p275. pdf
  • http://www. lexjansen. com/pnwsug/2004/ExtractingDatafromOracleintoSAS-LessonsLearned. pdf
  • https://support. sas. com/training/tutorial/el/libsppg3_at. pdf
  • http://www. atis. org/glossary/definition. aspx?id=5572
  • http://www. datamation. com/columns/article. php/3578916/The-Importance-of-Audit-Logs. htm
  • http://csrc. nist. gov/