Securely Managing Log Data using Cloud-based Syslog System
VerifiedAdded on 2019/09/30
|19
|5470
|212
Report
AI Summary
The research aims to study the highly secured syslog system in disaster management and disaster recovery sites using cloud systems. It focuses on the log management system using cloud, which is an important way to manage logs in a centralized server and send them to any local server when emergency or critical events occur. The research will employ both secondary and primary research methods and qualitative analysis method to provide a detailed understanding of syslog functions. Additionally, ethics are considered to maintain the respect, dignity, and privacy of humans involved in the data collection process.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Project Dissertation Proposal
Project Title: Highly Secured Cloud Based Syslog Disaster Management and Disaster
Recovery Site with Encrypted Log Data
By:
Thalpe Liyanage Rajitha Abhisheka
Student ID:
K1658825
Supervised by:
Dr. SAMEERA DE ALWIS
Project Title: Highly Secured Cloud Based Syslog Disaster Management and Disaster
Recovery Site with Encrypted Log Data
By:
Thalpe Liyanage Rajitha Abhisheka
Student ID:
K1658825
Supervised by:
Dr. SAMEERA DE ALWIS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
The aim of the paper is to explore into the highly secured cloud based syslog disaster
management system and also disaster recovery site using encrypted log. Syslog is a function
that helps the servers to send messages on critical events that is being taking place in an area.
It is a centrally located server and messages from this server is transmitted to other locations.
There are various log management process that the business has to follow while using it to
save messages. Moreover, cloud based system gives a better opportunity to secure the data
and save it from getting misused. The study will explore into this system and the ways it
benefits the disaster management companies while handling critical situation. For the purpose
a secondary and primary research tool is adopted and used so that the entire information on
the system is known. For primary method as survey will be conducted with the help of
questionnaire and will be filled by the disaster management companies. This will help the
research to get an accurate outcome of the survey.
The aim of the paper is to explore into the highly secured cloud based syslog disaster
management system and also disaster recovery site using encrypted log. Syslog is a function
that helps the servers to send messages on critical events that is being taking place in an area.
It is a centrally located server and messages from this server is transmitted to other locations.
There are various log management process that the business has to follow while using it to
save messages. Moreover, cloud based system gives a better opportunity to secure the data
and save it from getting misused. The study will explore into this system and the ways it
benefits the disaster management companies while handling critical situation. For the purpose
a secondary and primary research tool is adopted and used so that the entire information on
the system is known. For primary method as survey will be conducted with the help of
questionnaire and will be filled by the disaster management companies. This will help the
research to get an accurate outcome of the survey.
Table of Contents
Introduction..............................................................................................................................1
Background.............................................................................................................................. 2
Aim and Objectives..................................................................................................................3
Literature Review.....................................................................................................................4
Technologies and Resources.................................................................................................... 8
Method and Work Plan............................................................................................................ 9
Research approach.............................................................................................................................9
Research philosophy........................................................................................................................10
Data collection method....................................................................................................................10
Sampling method and size...............................................................................................................11
Data Analysis method......................................................................................................................11
Gantt chart..............................................................................................................................12
Discussion.............................................................................................................................. 12
Conclusion............................................................................................................................. 13
References.............................................................................................................................. 14
Introduction..............................................................................................................................1
Background.............................................................................................................................. 2
Aim and Objectives..................................................................................................................3
Literature Review.....................................................................................................................4
Technologies and Resources.................................................................................................... 8
Method and Work Plan............................................................................................................ 9
Research approach.............................................................................................................................9
Research philosophy........................................................................................................................10
Data collection method....................................................................................................................10
Sampling method and size...............................................................................................................11
Data Analysis method......................................................................................................................11
Gantt chart..............................................................................................................................12
Discussion.............................................................................................................................. 12
Conclusion............................................................................................................................. 13
References.............................................................................................................................. 14
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Introduction
Disaster management is a process by which the lives and property of people in the
economy is saved and managed from vulnerable natural and man-made disasters. The rate of
natural disaster has been increasing over the years and this had made it important for the
disaster management companies to take a step to protect the loss that take place. Even with
the progress in scientific and material solutions, the impact of disaster management has not
decreased to that extent. Thus, disaster management forms an integral part of the policy
framework of the economy to save the poor and underprivileged people from the negative
impact of such disaster (O'Brien et al. 2006). Disaster impacts property and huge loss to the
organization as well that exists in and around the property. According to Song et al. (2013)
disaster management is a prevention process that involves engaging in such an activity that
would help in reducing the impacts of disasters. Even though all disasters cannot be
prevented, its impact can be reduced to an extent that there is no harm to life and property.
Technology is improving in conducting disaster management work. The technology is
helping the disaster management person to carry out a good deal of control and prevent the
harmful impact. However, it is seen that while implementing the control process.
Disaster has been a common phenomenon in the Indian economy as about 59 percent
of the landmass of India is prone to earthquake, 40 million are prone to floods and other areas
are prone to various other types of disaster that hits the country from time to time with
different intensities. This has caused great loss to the private, community and public property
and thus the issue has been concerned on the global issue. The annual loss of India due to
various disaster that take place every year is estimated to be $9.8 billion. Among these loss
most of the loss has come from floods (Thakur 2015). Thus, this gave a wakeup call and has
made adequate investment in the reduction of risk from disaster loss. Various steps has been
Page | 1
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Introduction
Disaster management is a process by which the lives and property of people in the
economy is saved and managed from vulnerable natural and man-made disasters. The rate of
natural disaster has been increasing over the years and this had made it important for the
disaster management companies to take a step to protect the loss that take place. Even with
the progress in scientific and material solutions, the impact of disaster management has not
decreased to that extent. Thus, disaster management forms an integral part of the policy
framework of the economy to save the poor and underprivileged people from the negative
impact of such disaster (O'Brien et al. 2006). Disaster impacts property and huge loss to the
organization as well that exists in and around the property. According to Song et al. (2013)
disaster management is a prevention process that involves engaging in such an activity that
would help in reducing the impacts of disasters. Even though all disasters cannot be
prevented, its impact can be reduced to an extent that there is no harm to life and property.
Technology is improving in conducting disaster management work. The technology is
helping the disaster management person to carry out a good deal of control and prevent the
harmful impact. However, it is seen that while implementing the control process.
Disaster has been a common phenomenon in the Indian economy as about 59 percent
of the landmass of India is prone to earthquake, 40 million are prone to floods and other areas
are prone to various other types of disaster that hits the country from time to time with
different intensities. This has caused great loss to the private, community and public property
and thus the issue has been concerned on the global issue. The annual loss of India due to
various disaster that take place every year is estimated to be $9.8 billion. Among these loss
most of the loss has come from floods (Thakur 2015). Thus, this gave a wakeup call and has
made adequate investment in the reduction of risk from disaster loss. Various steps has been
Page | 1
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
taken to control the disasters and to control the impact various types of timely data is needed
and secured so that it can be used to estimate the threat from any disaster.
The paper plans to conduct a research into the use of highly secured cloud based
syslog disaster management and disaster recovery site with encrypted log. The report
discusses the meaning and concept of syslog in disaster management work in which
encrypted log will be used in disaster recovery site. Further, it proposes method to analyse the
role syslog offers to secure the data while conducting disaster management step and disaster
site recovery.
Background
Disaster management system is not an easy process as it requires a lot of information
and analysis to estimate and understand the urgency of the event and the threat a place has
from it. Further, the data is also required while deciding the disaster recovery site also to
understand the risk a place has. It helps in taking the decision about what kind of disaster
recovery site an organization needs and careful planning needs to be done to reduce the risk
(Song et al. 2013). However, all this is not possible without proper data management
techniques. One such data management technique and benefit is offered by the syslog disaster
management. Syslog is a system log that allows the network devices to send messages to a
centrally located server. The information from this server can then be used to help identify
critical events and alert the area about the disaster. This is the recent system that is allowing
the disaster management team to secure the area prior to the disaster (Kolhe and Shaikh
2018). The system is protected by encryption so that there is no kind of data breach in case of
critical incidents. This shows the importance that syslog system has formed in case of disaster
management and this makes it important for the researcher to conduct a research in this
technology of disaster management process. The syslog system server has an important role
Page | 2
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
taken to control the disasters and to control the impact various types of timely data is needed
and secured so that it can be used to estimate the threat from any disaster.
The paper plans to conduct a research into the use of highly secured cloud based
syslog disaster management and disaster recovery site with encrypted log. The report
discusses the meaning and concept of syslog in disaster management work in which
encrypted log will be used in disaster recovery site. Further, it proposes method to analyse the
role syslog offers to secure the data while conducting disaster management step and disaster
site recovery.
Background
Disaster management system is not an easy process as it requires a lot of information
and analysis to estimate and understand the urgency of the event and the threat a place has
from it. Further, the data is also required while deciding the disaster recovery site also to
understand the risk a place has. It helps in taking the decision about what kind of disaster
recovery site an organization needs and careful planning needs to be done to reduce the risk
(Song et al. 2013). However, all this is not possible without proper data management
techniques. One such data management technique and benefit is offered by the syslog disaster
management. Syslog is a system log that allows the network devices to send messages to a
centrally located server. The information from this server can then be used to help identify
critical events and alert the area about the disaster. This is the recent system that is allowing
the disaster management team to secure the area prior to the disaster (Kolhe and Shaikh
2018). The system is protected by encryption so that there is no kind of data breach in case of
critical incidents. This shows the importance that syslog system has formed in case of disaster
management and this makes it important for the researcher to conduct a research in this
technology of disaster management process. The syslog system server has an important role
Page | 2
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
to play to secure the data and use it at the time of emergency. This research will help in
knowing and identifying the critical events, logs, alerts and alarms that is given by the
network devices (Kelsey, Callas and Clemm 2010). In addition to this the attachment of cloud
system has helped in accessing the data from the network form anywhere in the world. Thus,
the rationale of the paper lies in the analysing the role that syslog plays in disaster
management and disaster recovery site.
Aim and Objectives
The aim of paper is to understand the role that syslog system of data management
plays in disaster management and disaster recovery site with the help of encrypted log data.
Further, the analysis will be done on the highly secured cloud based syslog rather than the in-
house data management. The paper will directly aim of this system on the basis of disaster
management and not for any other purpose or management areas. The objective of the paper
are as follows:
To analyse the concept of syslog system
To analyse the importance of high secured cloud based syslog system in which data is
found in encrypted format
To analyse the availability of the sensitive syslog data in the areas of investigation or
audit
To investigate into the role of highly secure cloud based syslog data in the disaster
management work
Page | 3
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
to play to secure the data and use it at the time of emergency. This research will help in
knowing and identifying the critical events, logs, alerts and alarms that is given by the
network devices (Kelsey, Callas and Clemm 2010). In addition to this the attachment of cloud
system has helped in accessing the data from the network form anywhere in the world. Thus,
the rationale of the paper lies in the analysing the role that syslog plays in disaster
management and disaster recovery site.
Aim and Objectives
The aim of paper is to understand the role that syslog system of data management
plays in disaster management and disaster recovery site with the help of encrypted log data.
Further, the analysis will be done on the highly secured cloud based syslog rather than the in-
house data management. The paper will directly aim of this system on the basis of disaster
management and not for any other purpose or management areas. The objective of the paper
are as follows:
To analyse the concept of syslog system
To analyse the importance of high secured cloud based syslog system in which data is
found in encrypted format
To analyse the availability of the sensitive syslog data in the areas of investigation or
audit
To investigate into the role of highly secure cloud based syslog data in the disaster
management work
Page | 3
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Literature Review
According to Kelsey, Callas and Clemm (2010) syslog is a computing tool that is used
for message logging in which it allows all network devices to send messages to the logging
server. This logging servers are also known as syslog server and are centrally located. The
process of syslog is supported by a number of devices or products that helps to collect logs or
records based on a particular event. Syslog allows the separation of three system that
circulates the logs from one place to another such as the software or device that collects the
logs or generates it, the network that stores or transfers the logs or messages and the software
that helps in analysing those logs. These three processes are managed by syslog in its own
way. The log generated in syslog is assigned with a code and a security level to help secure
the logs from any kind of alterations. It is a common function that is used by the system
designer for system management and security auditing and analysis. There are various types
of standards designed as well in a syslog system that is assigned to the security level
depending on the event that is occurring. Different types of designed standards are
emergency, alert, critical, error, warning and others. These security levels are assigned
depending on the situation and the level of severity that situation might assert (Kelsey, Callas
and Clemm 2010). The server using the syslog displays all types of severity occurring in that
system ranging from most severe to least severe level. This the role that system plays in
acquiring the log and transferring it to the situation for usage in a most secured way. Linux
based web server and windows based servers uses various software to push the syslog
message to the syslog server. Okmianski (2009) has pointed out that log is a record of all
types of information on events or activities that is being taking place on a system, network of
an organization. Logs are the most important information to be considered while solving a
problem in an emergency situation as it offers all possible information on that event. They are
a crucial requirement for identifying a security incidents, fraud activities and policy.
Page | 4
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Literature Review
According to Kelsey, Callas and Clemm (2010) syslog is a computing tool that is used
for message logging in which it allows all network devices to send messages to the logging
server. This logging servers are also known as syslog server and are centrally located. The
process of syslog is supported by a number of devices or products that helps to collect logs or
records based on a particular event. Syslog allows the separation of three system that
circulates the logs from one place to another such as the software or device that collects the
logs or generates it, the network that stores or transfers the logs or messages and the software
that helps in analysing those logs. These three processes are managed by syslog in its own
way. The log generated in syslog is assigned with a code and a security level to help secure
the logs from any kind of alterations. It is a common function that is used by the system
designer for system management and security auditing and analysis. There are various types
of standards designed as well in a syslog system that is assigned to the security level
depending on the event that is occurring. Different types of designed standards are
emergency, alert, critical, error, warning and others. These security levels are assigned
depending on the situation and the level of severity that situation might assert (Kelsey, Callas
and Clemm 2010). The server using the syslog displays all types of severity occurring in that
system ranging from most severe to least severe level. This the role that system plays in
acquiring the log and transferring it to the situation for usage in a most secured way. Linux
based web server and windows based servers uses various software to push the syslog
message to the syslog server. Okmianski (2009) has pointed out that log is a record of all
types of information on events or activities that is being taking place on a system, network of
an organization. Logs are the most important information to be considered while solving a
problem in an emergency situation as it offers all possible information on that event. They are
a crucial requirement for identifying a security incidents, fraud activities and policy.
Page | 4
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Song et al. (2013) has pointed out that the function of a syslog helps in making the
work of the network admin easier than before as they do not have to log into each devices
while investigating about their network infrastructure. There are various network devices that
helps in sending syslog messages and also confirms that the message has been sent
successfully. These devices usually uses TCP port 1468 to send those messages in a secured
form. According to Church et al. (2012) syslog messages are the most helpful one while
identifying analysing information about a critical event, alerts, logs or alarms. The system
helps in addressing those critical events in time by sending useful message or logs about it. A
syslog servers are placed under the same premises in a large scale data centre to be used in an
emergency situation. In some cases the servers are also placed in different geographical
locations. This is done so that in case of a critical situation the logs saved by the server are
used as a main fact for investigating into the events. Thus, this is the importance that syslog
holds in a critical incidents and there should always some efforts made to protect the syslog
server so that a conclusion can be reached after a critical incident has occurred.
Thottan and Ji (2004) has described that syslog server also allows various types of
management benefits as well as syslog messages helps an organization to change from a
reactive state to a proactive state. This means that the organization should use syslog
messages for predicting critical events rather than using it to know the facts of the events
after it has been caused.
Another important factor to be judged in the syslog system using cloud is to learn log
management system in cloud system. According to Lehner, Sattler and Sattler (2013) cloud is
one of the best and secured storage device of the logs and help in having access from
anywhere easily. Cloud offers three service models such as software as a service, platform as
a service and infrastructure as a service. Log management in cloud is a crucial decision to be
taken by the organization or the group using it for a purpose. Kolhe and Shaikh (2018) has
Page | 5
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Song et al. (2013) has pointed out that the function of a syslog helps in making the
work of the network admin easier than before as they do not have to log into each devices
while investigating about their network infrastructure. There are various network devices that
helps in sending syslog messages and also confirms that the message has been sent
successfully. These devices usually uses TCP port 1468 to send those messages in a secured
form. According to Church et al. (2012) syslog messages are the most helpful one while
identifying analysing information about a critical event, alerts, logs or alarms. The system
helps in addressing those critical events in time by sending useful message or logs about it. A
syslog servers are placed under the same premises in a large scale data centre to be used in an
emergency situation. In some cases the servers are also placed in different geographical
locations. This is done so that in case of a critical situation the logs saved by the server are
used as a main fact for investigating into the events. Thus, this is the importance that syslog
holds in a critical incidents and there should always some efforts made to protect the syslog
server so that a conclusion can be reached after a critical incident has occurred.
Thottan and Ji (2004) has described that syslog server also allows various types of
management benefits as well as syslog messages helps an organization to change from a
reactive state to a proactive state. This means that the organization should use syslog
messages for predicting critical events rather than using it to know the facts of the events
after it has been caused.
Another important factor to be judged in the syslog system using cloud is to learn log
management system in cloud system. According to Lehner, Sattler and Sattler (2013) cloud is
one of the best and secured storage device of the logs and help in having access from
anywhere easily. Cloud offers three service models such as software as a service, platform as
a service and infrastructure as a service. Log management in cloud is a crucial decision to be
taken by the organization or the group using it for a purpose. Kolhe and Shaikh (2018) has
Page | 5
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
stated that before deciding on the models of log management that one wants to choose, it is
necessary to first identify the reason as to why the log needs to be collected. There are a set of
reason on the basis of which the type of log management system (internally or in cloud) can
be decided. The first step in deciding the log management system is to identify the goals that
the project wants to achieve over the course of it. This will help them decide whether they
need an internal log management or in cloud. The need of log differs from business to
business such as the need of IT organization would be to use log for solving their issues,
while the security based business would interested in event management and use log in there.
Other than this, the other critical factor to log management is to find resources that will
handle and manage the log and the system (Lee et al. 2011). The third factor is to try the
service before purchasing it. This means that it is crucial to try the type of log management
system before deciding on to the type of system to be adopted.
According to Ray et al. (2013) selecting a log management system for the usage is
very much like building the partnership and then taking the service. However, as log
management is critical it is necessary to understand various factors that has to be considered
while taking cloud service provider. The factors that has to be considered are:
SaaS availability
Time within which the log data will be shown in the system
The delivery time of the alert to the client
Maintenance of compliance regularly
Upgrading the processing system with new attack vectors when a new attack is
identified
Support the upgrade to software and hardware system
Page | 6
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
stated that before deciding on the models of log management that one wants to choose, it is
necessary to first identify the reason as to why the log needs to be collected. There are a set of
reason on the basis of which the type of log management system (internally or in cloud) can
be decided. The first step in deciding the log management system is to identify the goals that
the project wants to achieve over the course of it. This will help them decide whether they
need an internal log management or in cloud. The need of log differs from business to
business such as the need of IT organization would be to use log for solving their issues,
while the security based business would interested in event management and use log in there.
Other than this, the other critical factor to log management is to find resources that will
handle and manage the log and the system (Lee et al. 2011). The third factor is to try the
service before purchasing it. This means that it is crucial to try the type of log management
system before deciding on to the type of system to be adopted.
According to Ray et al. (2013) selecting a log management system for the usage is
very much like building the partnership and then taking the service. However, as log
management is critical it is necessary to understand various factors that has to be considered
while taking cloud service provider. The factors that has to be considered are:
SaaS availability
Time within which the log data will be shown in the system
The delivery time of the alert to the client
Maintenance of compliance regularly
Upgrading the processing system with new attack vectors when a new attack is
identified
Support the upgrade to software and hardware system
Page | 6
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Other than this there are other considerations as well such as is the log management
system safe, the way it can be transported, the frequency in which the data is getting
transferred and others. All these has to be known before judging whether cloud service is
useful in log management system. Angin et al. (2010) on the other hand has stated that in
case the cloud provider is helping in sending alert for an emergency or critical events, it is
necessary to determine the way it is determining the event.
Waichal and Meshram (2013) has pointed out that log management under cloud has
an advantage that it allows to develop encrypted protocols that helps in maintaining the
confidentiality of the logs. There are various protocols that cloud system offers in log
management such as upload-tag generation, upload-log data, retrieve log data and delete logs.
In the upload tag generation it is necessary that the uploaded log record is secured with an
index key and it is set in such a way that it is not easy for the logging client to suggest the
value while monitoring the data. Further, upload logs data allows the user to send the
message for the uploaded log data and in return the logging monitor sends the log data to the
cloud which can then be retrieved for future use. The third protocol is on retrieve log data that
allows to download the log data from the cloud. The last protocol is delete logs which allows
the requester to send a message to the cloud and delete the data (Angin et al. 2010). Thus,
these are the protocols that can be used in log management when it is done in cloud. Cloud
log management system not only offers benefit of retrieving the data from anywhere, they
also help in offering security benefit to the logs.
These roles of log management is crucial in a disaster management sites as the
enterprise that runs such management of both natural and man-made disasters needs to adhere
to recovery policies. Thus, in this case logs offer the management with information to recover
from such disaster such as solution, data, events and also alarm to a secondary site.
Moreover, for this purpose a centralized event management is needed so that it can help in
Page | 7
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Other than this there are other considerations as well such as is the log management
system safe, the way it can be transported, the frequency in which the data is getting
transferred and others. All these has to be known before judging whether cloud service is
useful in log management system. Angin et al. (2010) on the other hand has stated that in
case the cloud provider is helping in sending alert for an emergency or critical events, it is
necessary to determine the way it is determining the event.
Waichal and Meshram (2013) has pointed out that log management under cloud has
an advantage that it allows to develop encrypted protocols that helps in maintaining the
confidentiality of the logs. There are various protocols that cloud system offers in log
management such as upload-tag generation, upload-log data, retrieve log data and delete logs.
In the upload tag generation it is necessary that the uploaded log record is secured with an
index key and it is set in such a way that it is not easy for the logging client to suggest the
value while monitoring the data. Further, upload logs data allows the user to send the
message for the uploaded log data and in return the logging monitor sends the log data to the
cloud which can then be retrieved for future use. The third protocol is on retrieve log data that
allows to download the log data from the cloud. The last protocol is delete logs which allows
the requester to send a message to the cloud and delete the data (Angin et al. 2010). Thus,
these are the protocols that can be used in log management when it is done in cloud. Cloud
log management system not only offers benefit of retrieving the data from anywhere, they
also help in offering security benefit to the logs.
These roles of log management is crucial in a disaster management sites as the
enterprise that runs such management of both natural and man-made disasters needs to adhere
to recovery policies. Thus, in this case logs offer the management with information to recover
from such disaster such as solution, data, events and also alarm to a secondary site.
Moreover, for this purpose a centralized event management is needed so that it can help in
Page | 7
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
filtering the most security data from the other type of data. Thus, this makes it important to
use the syslog function as it allows to manage events as well as the logs centrally. Thus, the
centralized syslog management system using cloud is the best option while managing logs
that is needed to manage any disaster events.
Technologies and Resources
This section will study the resources and the techniques that the researcher will use to
reach out to the evidence for the research and complete investigation. Resources forms an
integral part of the research because with lack of proper resources the researcher will not be
able to reach out to the accurate outcome of the result. In case of inadequate resources the
role of highly secured syslog function in disaster management and disaster recovery with the
use of cloud will not be clear. The paper intends to use two types of resources for the research
purpose such as primary and secondary resources (Pakes and Schankerman 1984). Further,
for these two resources there will be further sub-resources that would be required. The first
technique will be to conduct secondary data collection, which will use electronic device such
as ProQuest, Google Scholar and many other resources to study articles and past researches
on the topic. Only the trusted and the reliable search engine will be selected so that they offer
accurate information about syslog and cloud management system. These are the resources
that will be used to conduct secondary research. Further, for collecting primary research the
selected resources will be five disaster management companies that use this system of log
management to protect their data and utilize it to prevent or analysing any critical events.
Thus, for the purpose the companies will be approached using a questionnaire for the survey
(Amaratunga et al. 2002). The questionnaire in this area and the managers of the companies,
acts like a resource as it will help in continuing with the work. Other than this the internet
connection that will help in collecting both primary and secondary data also acts like an
Page | 8
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
filtering the most security data from the other type of data. Thus, this makes it important to
use the syslog function as it allows to manage events as well as the logs centrally. Thus, the
centralized syslog management system using cloud is the best option while managing logs
that is needed to manage any disaster events.
Technologies and Resources
This section will study the resources and the techniques that the researcher will use to
reach out to the evidence for the research and complete investigation. Resources forms an
integral part of the research because with lack of proper resources the researcher will not be
able to reach out to the accurate outcome of the result. In case of inadequate resources the
role of highly secured syslog function in disaster management and disaster recovery with the
use of cloud will not be clear. The paper intends to use two types of resources for the research
purpose such as primary and secondary resources (Pakes and Schankerman 1984). Further,
for these two resources there will be further sub-resources that would be required. The first
technique will be to conduct secondary data collection, which will use electronic device such
as ProQuest, Google Scholar and many other resources to study articles and past researches
on the topic. Only the trusted and the reliable search engine will be selected so that they offer
accurate information about syslog and cloud management system. These are the resources
that will be used to conduct secondary research. Further, for collecting primary research the
selected resources will be five disaster management companies that use this system of log
management to protect their data and utilize it to prevent or analysing any critical events.
Thus, for the purpose the companies will be approached using a questionnaire for the survey
(Amaratunga et al. 2002). The questionnaire in this area and the managers of the companies,
acts like a resource as it will help in continuing with the work. Other than this the internet
connection that will help in collecting both primary and secondary data also acts like an
Page | 8
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
important resource. This is because in case of absence of internet connection none of the files
can be opened nor the questionnaire can be mailed to the companies. The most important
resource above all this is time as it is the most crucial thing for conducting the overall
research appropriately and with minimum errors.
Method and Work Plan
The work plan offers a systematic view of the entire research process so that the
researcher can move forward the entire research in a proper manner and reduce potential
errors. The methodology of the research helps in designing the research approach, research
philosophy, and data collection method and research analysis (Prasad et al. 2012). All these
together allows the researcher to understand the way they can reach to the accurate outcome
of the research.
Research approach
Research approach allows the user to know the ways in which it can approach the
process of the research that could help him get the best possible outcome. Research approach
is a systematic tool that decides the attitude that the researcher use for conducting the
investigation. There are two types of research approach method such as inductive method and
deductive method of research approach. The inductive approach is adopted when the
researcher intends to collect data from a new source and a new information is formed out of
it. On the other hand, deductive approach allows the research to deduce the information from
sources in which the information is already available and known (Holt 2009). There is no
new information formed out of a deductive approach. The researcher will use both deductive
and inductive approach for investigating into the use of highly secured syslog function in
disaster management.
Page | 9
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
important resource. This is because in case of absence of internet connection none of the files
can be opened nor the questionnaire can be mailed to the companies. The most important
resource above all this is time as it is the most crucial thing for conducting the overall
research appropriately and with minimum errors.
Method and Work Plan
The work plan offers a systematic view of the entire research process so that the
researcher can move forward the entire research in a proper manner and reduce potential
errors. The methodology of the research helps in designing the research approach, research
philosophy, and data collection method and research analysis (Prasad et al. 2012). All these
together allows the researcher to understand the way they can reach to the accurate outcome
of the research.
Research approach
Research approach allows the user to know the ways in which it can approach the
process of the research that could help him get the best possible outcome. Research approach
is a systematic tool that decides the attitude that the researcher use for conducting the
investigation. There are two types of research approach method such as inductive method and
deductive method of research approach. The inductive approach is adopted when the
researcher intends to collect data from a new source and a new information is formed out of
it. On the other hand, deductive approach allows the research to deduce the information from
sources in which the information is already available and known (Holt 2009). There is no
new information formed out of a deductive approach. The researcher will use both deductive
and inductive approach for investigating into the use of highly secured syslog function in
disaster management.
Page | 9
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Research philosophy
Research philosophy helps in stating the logic on which the research is being
conducted and the ways in which it should be done. There are various types of research
philosophy such as realism, positivism, interpretivism and others. Each of it helps in defining
a new logic to the research area in which the investigation will take place. The paper will use
both positivism and interpretivism philosophy. This is because the paper will use both
secondary and primary data for the research. While collecting secondary data, the positivism
philosophy is accurate because it depends on the philosophy that reality is known and it can
be used with the help of observation and without interfering into it much. On the other hand,
interpretivism philosophy is used while collecting primary data. This is because
interpretivism philosophy contends that by interfering into the reality the exact meaning is
understood (Pakes and Schankerman 1984). Thus, both the philosophy will be used in the
paper for conducting primary and secondary research each.
Data collection method
This is the major and the most important area of the research and helps in knowing the
way in which the researcher will collect data about the investigation. There are two types of
data collection method such as primary data collection and secondary data collection method.
Primary data collection method allow collecting data directly from the source so that it is
accurate and reliable (Kumar and Phrommathed 2005). On the other hand, Kothari (2004)
points out that secondary data collection method collect data from already existing sources or
data from internet. Secondary data is collected from reliable sources such as Google Scholar,
Podcasts and others. For the paper the researcher will use a mixed method for collecting data
using both secondary and primary data collection method (Amaratunga et al. 2002). This will
allow the researcher to get a detailed analysis of the data available and use it in the data. For
the secondary research method the researcher will search few keywords in internet to get
Page | 10
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Research philosophy
Research philosophy helps in stating the logic on which the research is being
conducted and the ways in which it should be done. There are various types of research
philosophy such as realism, positivism, interpretivism and others. Each of it helps in defining
a new logic to the research area in which the investigation will take place. The paper will use
both positivism and interpretivism philosophy. This is because the paper will use both
secondary and primary data for the research. While collecting secondary data, the positivism
philosophy is accurate because it depends on the philosophy that reality is known and it can
be used with the help of observation and without interfering into it much. On the other hand,
interpretivism philosophy is used while collecting primary data. This is because
interpretivism philosophy contends that by interfering into the reality the exact meaning is
understood (Pakes and Schankerman 1984). Thus, both the philosophy will be used in the
paper for conducting primary and secondary research each.
Data collection method
This is the major and the most important area of the research and helps in knowing the
way in which the researcher will collect data about the investigation. There are two types of
data collection method such as primary data collection and secondary data collection method.
Primary data collection method allow collecting data directly from the source so that it is
accurate and reliable (Kumar and Phrommathed 2005). On the other hand, Kothari (2004)
points out that secondary data collection method collect data from already existing sources or
data from internet. Secondary data is collected from reliable sources such as Google Scholar,
Podcasts and others. For the paper the researcher will use a mixed method for collecting data
using both secondary and primary data collection method (Amaratunga et al. 2002). This will
allow the researcher to get a detailed analysis of the data available and use it in the data. For
the secondary research method the researcher will search few keywords in internet to get
Page | 10
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
appropriate information such as “Syslog”, “Disaster management”, “Log management”,
“cloud system” and others. the primary method will be done by conducting a survey with five
disaster management company that use this syslog system to maintain data used for critical
events. The survey will be filled by 10 managers which will consists of 2 managers from each
company and the result obtained will be surveyed whether high security syslog system helps
in disaster management system. The survey will consists of a questionnaire consisting of 10
questions that will help in generating an outcome.
Sampling method and size
A sample will be chosen for the research in such a way that it could represent the
entire population of disaster management companies. The sampling will be done with the
help of non-probabilistic sampling because it will focus on collecting data from disaster
management companies that use the syslog system and not the entire group of disaster
management entity. The sample selected for the survey will be five disaster management
companies using the syslog system to manage their logs while critical events and 10
managers will participate in the survey from the selected companies.
Data Analysis method
There are two types of data analysis method such as qualitative method and
quantitative method of data analysis. The data analysis method helps in analysing the data in
the best possible way so that the desired outcome is achieved (Newman and Benz 1998). The
paper will use qualitative method of data analysis in which the data will be analysed in a
descriptive way so that it is easily understood by the reader and the collected data is analysed
in a detailed way.
Page | 11
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
appropriate information such as “Syslog”, “Disaster management”, “Log management”,
“cloud system” and others. the primary method will be done by conducting a survey with five
disaster management company that use this syslog system to maintain data used for critical
events. The survey will be filled by 10 managers which will consists of 2 managers from each
company and the result obtained will be surveyed whether high security syslog system helps
in disaster management system. The survey will consists of a questionnaire consisting of 10
questions that will help in generating an outcome.
Sampling method and size
A sample will be chosen for the research in such a way that it could represent the
entire population of disaster management companies. The sampling will be done with the
help of non-probabilistic sampling because it will focus on collecting data from disaster
management companies that use the syslog system and not the entire group of disaster
management entity. The sample selected for the survey will be five disaster management
companies using the syslog system to manage their logs while critical events and 10
managers will participate in the survey from the selected companies.
Data Analysis method
There are two types of data analysis method such as qualitative method and
quantitative method of data analysis. The data analysis method helps in analysing the data in
the best possible way so that the desired outcome is achieved (Newman and Benz 1998). The
paper will use qualitative method of data analysis in which the data will be analysed in a
descriptive way so that it is easily understood by the reader and the collected data is analysed
in a detailed way.
Page | 11
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Gantt chart
Activities Week 1 Week 3 Week 6 Week
10
Week
15
Week
18
Week 22
Selecting the research
topic
Literature Review
Selection of research
methods
Collecting primary data
Studying secondary
sources
Drawing conclusion
Providing proper
recommendations
Submitting the research
Fig-Time Schedule
(Sources: Author’s creation)
Discussion
Ethics and safety has been one of the important considerations in today’s research that
is being conducted. Moreover, ethics has to be maintained in every research in which humans
are involved so that their privacy, dignity and respect is not hampered in anyway. In this
paper as well ethics and safety has to be maintained while conducting the survey with the
help of a questionnaire. As an international norms it is essential to maintain the ethical
Page | 12
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Gantt chart
Activities Week 1 Week 3 Week 6 Week
10
Week
15
Week
18
Week 22
Selecting the research
topic
Literature Review
Selection of research
methods
Collecting primary data
Studying secondary
sources
Drawing conclusion
Providing proper
recommendations
Submitting the research
Fig-Time Schedule
(Sources: Author’s creation)
Discussion
Ethics and safety has been one of the important considerations in today’s research that
is being conducted. Moreover, ethics has to be maintained in every research in which humans
are involved so that their privacy, dignity and respect is not hampered in anyway. In this
paper as well ethics and safety has to be maintained while conducting the survey with the
help of a questionnaire. As an international norms it is essential to maintain the ethical
Page | 12
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
standard which conducting any research (Gregory 2003). The ethical consideration of the
research looks into various ethical rights such as the protection of dignity of the individual
and also of the information provided by them. In this paper as well the respondents that will
participate in the survey such as the manager of the disaster management companies that uses
syslog system. The participants will demand that the answers given by them are secured and
is not misused for some other work. Thus, the first ethics will follow that the confidentiality
and protection of the answers will be maintained. Further, while making the questionnaire it
will be kept in mind that none of the question harms the dignity of the participants and does
not ask for any personal information (Gregory 2003). Moreover, while using the information
from the questionnaire anonymity will be maintained so that there is no privacy issue faced
by the participants as well as the researcher.
Conclusion
From the above analysis it can be concluded that the entire research will help in
learning about the highly secured syslog system in disaster management and disaster recovery
site using cloud system. the system of log management using cloud has been studied and
showed that is important way to manage logs in a centralized server sand sent it to any local
server when and emergency or critical events take place. Various protocols are also added by
cloud system of log management that allows encryption of data sand secure it from any kind
of risk. Many other area has been studied about log management and its role in disaster
management system. The research is a useful one and will be conducted using both secondary
and primary research method and qualitative analysis method so that a detailed understanding
and information about the syslog function can be known. Thus, the researcher will follow a
mixed methodology to research into the topic deeply. As humans will be involved in the
primary data collection process, ethics are also considered and are maintained in a better way
Page | 13
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
standard which conducting any research (Gregory 2003). The ethical consideration of the
research looks into various ethical rights such as the protection of dignity of the individual
and also of the information provided by them. In this paper as well the respondents that will
participate in the survey such as the manager of the disaster management companies that uses
syslog system. The participants will demand that the answers given by them are secured and
is not misused for some other work. Thus, the first ethics will follow that the confidentiality
and protection of the answers will be maintained. Further, while making the questionnaire it
will be kept in mind that none of the question harms the dignity of the participants and does
not ask for any personal information (Gregory 2003). Moreover, while using the information
from the questionnaire anonymity will be maintained so that there is no privacy issue faced
by the participants as well as the researcher.
Conclusion
From the above analysis it can be concluded that the entire research will help in
learning about the highly secured syslog system in disaster management and disaster recovery
site using cloud system. the system of log management using cloud has been studied and
showed that is important way to manage logs in a centralized server sand sent it to any local
server when and emergency or critical events take place. Various protocols are also added by
cloud system of log management that allows encryption of data sand secure it from any kind
of risk. Many other area has been studied about log management and its role in disaster
management system. The research is a useful one and will be conducted using both secondary
and primary research method and qualitative analysis method so that a detailed understanding
and information about the syslog function can be known. Thus, the researcher will follow a
mixed methodology to research into the topic deeply. As humans will be involved in the
primary data collection process, ethics are also considered and are maintained in a better way
Page | 13
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
so that their respect dignity and privacy is not hampered in anyway while using the survey for
the work.
References
Amaratunga, D., Baldry, D., Sarshar, M. and Newton, R., 2002. Quantitative and qualitative
research in the built environment: application of “mixed” research approach. Work
study, 51(1), pp.17-31.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B. and Lilien,
L., 2010, October. An entity-centric approach for privacy and identity management in cloud
computing. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (pp. 177-183).
IEEE.
Church, C., Golovinsky, E. and Govshteyn, M., Alert Logic Inc, 2012. Systems and methods
for correlating log messages into actionable security incidents and managing human
responses. U.S. Patent 8,156,553.
Gregory, I., 2003. Ethics in research. A&C Black.
Holt, J., 2009. Quantitative research: An overview. British Journal of Cardiac Nursing, 4(5),
pp.234-236.
Kelsey, J., Callas, J. and Clemm, A., 2010. Signed syslog messages (No. RFC 5848).
Kolhe, H.N. and Shaikh, I.R., Design of Secure Log Management Over Cloud.
Kothari, C.R., 2004. Research methodology: Methods and techniques. New Age
International.
Kumar, S. and Phrommathed, P., 2005. Research methodology (pp. 43-50). Springer US.
Lee, J.H., Park, M.W., Eom, J.H. and Chung, T.M., 2011, February. Multi-level intrusion
detection system and log management in cloud computing. In Advanced Communication
Technology (ICACT), 2011 13th International Conference on (pp. 552-555). IEEE.
Page | 14
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
so that their respect dignity and privacy is not hampered in anyway while using the survey for
the work.
References
Amaratunga, D., Baldry, D., Sarshar, M. and Newton, R., 2002. Quantitative and qualitative
research in the built environment: application of “mixed” research approach. Work
study, 51(1), pp.17-31.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B. and Lilien,
L., 2010, October. An entity-centric approach for privacy and identity management in cloud
computing. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (pp. 177-183).
IEEE.
Church, C., Golovinsky, E. and Govshteyn, M., Alert Logic Inc, 2012. Systems and methods
for correlating log messages into actionable security incidents and managing human
responses. U.S. Patent 8,156,553.
Gregory, I., 2003. Ethics in research. A&C Black.
Holt, J., 2009. Quantitative research: An overview. British Journal of Cardiac Nursing, 4(5),
pp.234-236.
Kelsey, J., Callas, J. and Clemm, A., 2010. Signed syslog messages (No. RFC 5848).
Kolhe, H.N. and Shaikh, I.R., Design of Secure Log Management Over Cloud.
Kothari, C.R., 2004. Research methodology: Methods and techniques. New Age
International.
Kumar, S. and Phrommathed, P., 2005. Research methodology (pp. 43-50). Springer US.
Lee, J.H., Park, M.W., Eom, J.H. and Chung, T.M., 2011, February. Multi-level intrusion
detection system and log management in cloud computing. In Advanced Communication
Technology (ICACT), 2011 13th International Conference on (pp. 552-555). IEEE.
Page | 14
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Lehner, W., Sattler, K.U. and Sattler, K.U., 2013. Web-scale data management for the
cloud (Vol. 5). Berlin: Springer.
Newman, I. and Benz, C.R., 1998. Qualitative-quantitative research methodology: Exploring
the interactive continuum. SIU Press.
O'Brien, G., O'Keefe, P., Rose, J. and Wisner, B., 2006. Climate change and disaster
management. Disasters, 30(1), pp.64-80.
Okmianski, A., 2009. Transmission of syslog Messages over UDP (No. RFC 5426).
Pakes, A. and Schankerman, M., 1984. The rate of obsolescence of patents, research gestation
lags, and the private rate of return to research resources. In R&D, patents, and
productivity (pp. 73-88). University of Chicago Press.
Prasad, M.R., Sharath, V., Nagendra, G., Reddy, K.D. and Sridhar, V., 2012. Research
Method to Optimizse Logger for Telecom Application Running on Embedded
System. International Journal of Engineering Research and Development, 1(6), pp.01-09.
Ray, I., Belyaev, K., Strizhov, M., Mulamba, D. and Rajaram, M., 2013. Secure logging as a
service—delegating log management to the cloud. IEEE systems journal, 7(2), pp.323-334.
Resnik, D.B., 2011. What is ethics in research & why is it important. National Institute of
Environmental Health Sciences, pp.1-10.
Song, S., Hong, S., Guan, X., Choi, B.Y. and Choi, C., 2013, May. NEOD: network
embedded on-line disaster management framework for software defined networking.
In Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium
on (pp. 492-498). IEEE.
Thakur, P. (2015). Disasters cost India $10bn per year: UN report - Times of India. [online]
The Times of India. Available at: https://timesofindia.indiatimes.com/india/Disasters-cost-
India-10bn-per-year-UN-report/articleshow/46522526.cms [Accessed 4 Aug. 2018].
Page | 15
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Lehner, W., Sattler, K.U. and Sattler, K.U., 2013. Web-scale data management for the
cloud (Vol. 5). Berlin: Springer.
Newman, I. and Benz, C.R., 1998. Qualitative-quantitative research methodology: Exploring
the interactive continuum. SIU Press.
O'Brien, G., O'Keefe, P., Rose, J. and Wisner, B., 2006. Climate change and disaster
management. Disasters, 30(1), pp.64-80.
Okmianski, A., 2009. Transmission of syslog Messages over UDP (No. RFC 5426).
Pakes, A. and Schankerman, M., 1984. The rate of obsolescence of patents, research gestation
lags, and the private rate of return to research resources. In R&D, patents, and
productivity (pp. 73-88). University of Chicago Press.
Prasad, M.R., Sharath, V., Nagendra, G., Reddy, K.D. and Sridhar, V., 2012. Research
Method to Optimizse Logger for Telecom Application Running on Embedded
System. International Journal of Engineering Research and Development, 1(6), pp.01-09.
Ray, I., Belyaev, K., Strizhov, M., Mulamba, D. and Rajaram, M., 2013. Secure logging as a
service—delegating log management to the cloud. IEEE systems journal, 7(2), pp.323-334.
Resnik, D.B., 2011. What is ethics in research & why is it important. National Institute of
Environmental Health Sciences, pp.1-10.
Song, S., Hong, S., Guan, X., Choi, B.Y. and Choi, C., 2013, May. NEOD: network
embedded on-line disaster management framework for software defined networking.
In Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium
on (pp. 492-498). IEEE.
Thakur, P. (2015). Disasters cost India $10bn per year: UN report - Times of India. [online]
The Times of India. Available at: https://timesofindia.indiatimes.com/india/Disasters-cost-
India-10bn-per-year-UN-report/articleshow/46522526.cms [Accessed 4 Aug. 2018].
Page | 15
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with
Encrypted Log Data
Thottan, M. and Ji, C., Rensselaer Polytechnic Institute, 2004. Fault detection and prediction
for management of computer networks. U.S. Patent Application 10/433,459.
Waichal, S. and Meshram, B.B., 2013. Router attacks-detection and defense
mechanisms. International Journal of Scientific & Technology Research, 2(6).
Page | 16
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
Encrypted Log Data
Thottan, M. and Ji, C., Rensselaer Polytechnic Institute, 2004. Fault detection and prediction
for management of computer networks. U.S. Patent Application 10/433,459.
Waichal, S. and Meshram, B.B., 2013. Router attacks-detection and defense
mechanisms. International Journal of Scientific & Technology Research, 2(6).
Page | 16
Name: Thalpe Liyanage Rajitha Abhisheka Student ID: K1658825
1 out of 19
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.