CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Audit Trail

Published on February 2019 by Priyanka Nikalje, Gauresh Lotlikar, Manish Mishra, Shirshendu Maitra
Leveraging Information Technology for Inter-Sectoral Research
Foundation of Computer Science USA
ICAIM2017 - Number 2
February 2019
Authors: Priyanka Nikalje, Gauresh Lotlikar, Manish Mishra, Shirshendu Maitra
1c4f46d8-480d-452f-9004-ca2c2a84465c

Priyanka Nikalje, Gauresh Lotlikar, Manish Mishra, Shirshendu Maitra . Audit Trail. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 2 (February 2019), 9-11.

@article{
author = { Priyanka Nikalje, Gauresh Lotlikar, Manish Mishra, Shirshendu Maitra },
title = { Audit Trail },
journal = { Leveraging Information Technology for Inter-Sectoral Research },
issue_date = { February 2019 },
volume = { ICAIM2017 },
number = { 2 },
month = { February },
year = { 2019 },
issn = 0975-8887,
pages = { 9-11 },
numpages = 3,
url = { /proceedings/icaim2017/number2/30390-1721/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Leveraging Information Technology for Inter-Sectoral Research
%A Priyanka Nikalje
%A Gauresh Lotlikar
%A Manish Mishra
%A Shirshendu Maitra
%T Audit Trail
%J Leveraging Information Technology for Inter-Sectoral Research
%@ 0975-8887
%V ICAIM2017
%N 2
%P 9-11
%D 2019
%I International Journal of Computer Applications
Abstract

In today's IT world computer systems are vulnerable by both insiders (i. e. employees) as well as penetration by outsiders (or attackers). Also there are evidences showing the growing number of incidents reported in the press for such abuse. Closing all security loopholes from today's system is infeasible, whereas no combination of technologies can prevent legitimate users from abusing their authority in a system, auditing in viewed as the last line of defense. But auditing a large amount of data is not a feasible option hence what is needed is automated tools to analyze the vast amount of audit data for suspicious user behavior. This paper presents audit trail analysis technique and intrusion detection systems that have emerged in the past several years.

References
  1. http://www. academypublisher. com/proc/isnns10/paper/isnns10p275. pdf
  2. http://www. lexjansen. com/pnwsug/2004/ExtractingDatafromOracleintoSAS-LessonsLearned. pdf
  3. https://support. sas. com/training/tutorial/el/libsppg3_at. pdf
  4. http://www. atis. org/glossary/definition. aspx?id=5572
  5. http://www. datamation. com/columns/article. php/3578916/The-Importance-of-Audit-Logs. htm
  6. http://csrc. nist. gov/
Index Terms

Computer Science
Information Sciences

Keywords

System Log Audit Trail