Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Log

Handbook of Research on Emerging Developments in Data Privacy
A security log stores log record in chronological order. The terms security log and audit trail are often used interchangeably within the security community.
Published in Chapter:
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
Ulf Larson (Ericsson AB, Sweden), Erland Jonsson (Chalmers University of Technology, Sweden), and Stefan Lindskog (Karlstad University, Sweden)
Copyright: © 2015 |Pages: 31
DOI: 10.4018/978-1-4666-7381-6.ch016
Abstract
This chapter aims at providing a clear and concise picture of data collection for intrusion detection. It provides a detailed explanation of generic data collection mechanism components and the interaction with the environment, from initial triggering to output of log data records. Taxonomies of mechanism characteristics and deployment considerations are provided and discussed. Furthermore, guidelines and hints for mechanism selection and deployment are provided. Finally, this chapter presents a set of strategies for determining what data to collect, and it also discusses some of the challenges in the field. An appendix providing a classification of 50 studied mechanisms is also provided. This chapter aims at assisting intrusion detection system developers, designers, and operators in selecting mechanisms for resource-efficient data collection.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR