Research Article
Integrating Traffics with Network Device Logs for Anomaly Detection
Table 2
Detailsof the network device logs.
| | Firewall logs | Traffic logs | Event logs | Network logs | Security logs | System logs | Cron logs | Mail logs | Messages logs | Mysqld logs |
| Data | | | | | | | | | | | Time | | | | | | | | | | | Module | | | | | | | | | | | Level | | | | | | | | | | | PID | | | | | | | | | | | Type | | | | | | | | | | | Action | | | | | | | | | | | Source | | | | | | | | | | | Destination | | | | | | | | | | | Translated Source | | | | | | | | | | | Translated Destination | | | | | | | | | | | Duration | | | | | | | | | | | Bytes Sent | | | | | | | | | | | Bytes Received | | | | | | | | | | | Application | | | | | | | | | | | Reason | | | | | | | | | | |
|
|