Search results
1 – 10 of 168Abstract
Details
Keywords
Abstract
Details
Keywords
Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…
Abstract
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.
Details
Keywords
Sir Gil Simpson is one of New Zealand℉s pioneers in software development, having started in the field in 1967. He holds steadfast to his dream that one day his approach to…
Abstract
Sir Gil Simpson is one of New Zealand℉s pioneers in software development, having started in the field in 1967. He holds steadfast to his dream that one day his approach to software programming will take hold around the world. Simpson has just opened up the company℉s first office in the United States; he expects his first significant foray into this country will be a successful one.
Tommie L. Ellis, Robert A. Nicholson, Antoinette Y. Briggs, Scott A. Hunter, James E. Harbison, Paul S. Saladna, Michael W. Garris, Robert K. Ohnemus, John E. O’Connor and Steven B. Reynolds
Rising operational costs and software sustainment concerns have driven the Air Force to move to newer technology to ensure that the Air Force Standard Base Supply System (SBSS…
Abstract
Purpose
Rising operational costs and software sustainment concerns have driven the Air Force to move to newer technology to ensure that the Air Force Standard Base Supply System (SBSS) can continue to provide affordable and sustainable mission support in the years to come. This paper aims to summarize the successful software modernization effort the Air Force undertook to achieve that objective.
Design/methodology/approach
The paper describes the preliminary system updates that were required to isolate the SBSS software from all internal and external system and user interfaces in preparation for the subsequent successful code roll effort. Once the legacy SBSS component was fully isolated, the SBSS software modernization objective was achieved via a “code roll” conversion of the SBSS software from legacy COBOL to Java code, and movement of the integrated logistics system-supply application from a proprietary information technology (IT) platform to an open IT operating environment.
Findings
The SBSS system modernization yielded immediate and significant IT operational cost reductions and provided an important foundation for achieving Air Force logistics system consolidation and cloud computing objectives going forward.
Originality/value
The SBSS modernization experience should be useful in assisting similar data system software modernization efforts.
Details
Keywords