Abstract
Modern IT systems rely heavily on event logging and event logs. Many applications, operating systems, network devices, and other system components can log events to a local or remote log server. The existing log-based event analysis tools has limited forensic functionality, and search engines cannot filter the events by criteria. As a solution, this study provides a log analysis system that allows forensic investigators to log in using their email address and upload log files from an external device for processing. This also makes it possible to start a thorough investigation or carry out a quick analysis. In addition to uploading, this allows you to scan the exported log file for errors that require quick attention. Additionally, it allows for the import of numerous log files. The goal of this research is to be able to examine Windows event logs and read files in .csv format. The ability to extract meaning from a range of occurrences, as well as output structuring that represents this data in an accessible and easy-to-read format. Log files were uploaded, and a rapid analysis and user-filterable log search strategy were employed to accomplish this.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.