Abstract
In the past few years, there has been a tremendous increase in cyberattacks and cybercrimes. Technology is changing at a very fast pace, thus inviting more advanced cyberattacks. Any event that is triggered on the system is recorded in the form of logs in log files. It may be any warning, any alert, and information, and all the things get stored in the logs. Therefore, from the security point of view, analyzing the logs plays a crucial role in the forensic investigation or for analytics purposes also. This paper highlights a systematic approach for analyzing the log files using a string-matching algorithm and regular expressions. Thus, it helps in log analysis, management, and analytics for future reference. Analyzing logs in a systematic way is always crucial in digital forensics, and it will help in the smooth conduction of forensic investigations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
He, S., Zhu, J., He, P., Lyu, M.R.: Experience report: system log analysis for anomaly detection. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), Ottawa, ON, pp. 207–218 (2016). https://doi.org/10.1109/ISSRE.2016.21
Ni, Z., Liu, H., Chen, Y., Wu, D.: Research and implementation of a method for web log analysis template extraction. Procedia Comput. Sci. 162, 673–681 (2019). ISSN: 1877-0509
Liu, X., Zhu, Y., Ji, S.: Web log analysis in genealogy system. In: 2020 IEEE International Conference on Knowledge Graph (ICKG), Nanjing, China, pp. 536–543 (2020). https://doi.org/10.1109/ICBK50248.2020.00081
Kacprzak, E., Koesten, L., Ibáñez, L., Simperl, E., Tennison, J.: A query log analysis of dataset search. In: Lecture Notes in Computer Science, pp. 429–436 (2017). https://doi.org/10.1007/978-3-319-60131-1_29
Cao, Q., Qiao, Y., Lyu, Z.: Machine learning to detect anomalies in web log analysis. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, pp. 519–523 (2017). https://doi.org/10.1109/CompComm.2017.8322600
Best Practices: Event Log Management for Security and Compliance (2021). https://www.whatsupgold.com/resources/best-practices/event-log-management
Jansen, B.: The methodology of search log analysis. In: Handbook of Research on Web Log Analysis, pp. 100–123 (2009). https://doi.org/10.4018/978-1-59904-974-8.ch006
Sultana, N., Paira, S., Chandra, S., Alam, S.: A brief study and analysis of different searching algorithms. In: 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT) (2017). https://doi.org/10.1109/icecct.2017.8117821
IBM Knowledge Center.: Ibm.com (2021). https://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_72/rzasp/rzasp_regularexpression.html
Lu, X.: The analysis of KMP algorithm and its optimization. J. Phys. Conf. Ser. 1345, 042005 (2019). https://doi.org/10.1088/1742-6596/1345/4/042005
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kaushik, K., Sharma, G., Goyal, G., Sharma, A.K., Chaubey, A. (2022). A Systematic Approach for Analyzing Log Files Based on String Matching Regular Expressions. In: Khanna, K., Estrela, V.V., Rodrigues, J.J.P.C. (eds) Cyber Security and Digital Forensics . Lecture Notes on Data Engineering and Communications Technologies, vol 73. Springer, Singapore. https://doi.org/10.1007/978-981-16-3961-6_1
Download citation
DOI: https://doi.org/10.1007/978-981-16-3961-6_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3960-9
Online ISBN: 978-981-16-3961-6
eBook Packages: EngineeringEngineering (R0)