Penerapan Syslog Monitoring Jaringan Menggunakan The Dude dan EoIP Tunnel
Abstract
Keywords
References
G. Slomovitz, “Latent semantic analysis (LSA) for syslog correlation,” 2017 Int. Conf. Electron. Commun. Comput. CONIELECOMP 2017, 2017.
W. MikroTik, “Manual:Interface/EoIP - MikroTik Wiki,” 2018. [Online]. Available: https://wiki.mikrotik.com/wiki/Manual:Interface/EoIP. [Accessed: 10-Nov-2018].
C. M. Kozierok, The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. 2005.
A. Kaushik, “Use of Open Source Technologies for Enterprise Server Monitoring Using Snmp,” Technology, vol. 02, no. 07, pp. 2246–2252, 2010.
R. Vaarandi, B. Blumbergs, M. Kont, R. Vaarandi, B. Blumbergs, and M. Kont, “An Unsupervised Framework for Detecting Anomalous Messages from Syslog Log Files An Unsupervised Framework for Detecting Anomalous Messages from Syslog Log Files,” NOMS 2018 - 2018 IEEE/IFIP Netw. Oper. Manag. Symp., pp. 1–6, 2018.
M. Ljubojevic, A. Bajic, and D. Mijic, “Centralized monitoring of computer networks using Zenoss open source platform,” 2018 17th Int. Symp. INFOTEH-JAHORINA, INFOTEH 2018 - Proc., vol. 2018–Janua, no. March, pp. 1–5, 2018.
S. Kobayashi, K. Otomo, K. Fukuda, and H. Esaki, “Mining Causality of Network Events in Log Data,” IEEE Trans. Netw. Serv. Manag., vol. 15, no. 1, pp. 53–67, 2018.
S. Zhang et al., “Syslog processing for switch failure diagnosis and prediction in datacenter networks,” 2017 IEEE/ACM 25th Int. Symp. Qual. Serv. IWQoS 2017, pp. 1–10, 2017.
E. Baseman, S. Blanchard, Z. Li, and S. Fu, “Relational synthesis of text and numeric data for anomaly detection on computing system logs,” Proc. - 2016 15th IEEE Int. Conf. Mach. Learn. Appl. ICMLA 2016, vol. 1, pp. 882–885, 2017.
T. Tan, S. Gao, W. Yang, Y. Song, and C. Lin, “Two new term weighting methods for router syslogs anomaly detection,” Proc. - 18th IEEE Int. Conf. High Perform. Comput. Commun. 14th IEEE Int. Conf. Smart City 2nd IEEE Int. Conf. Data Sci. Syst. HPCC/SmartCity/DSS 2016, pp. 1454–1460, 2017.
Q. Vuong, H. M. Tran, and S. T. Le, “Distributed Event Monitoring for Software Defined Networks,” 2015 Int. Conf. Adv. Comput. Appl., pp. 90–97, 2015.
T. Kimura, A. Watanabe, T. Toyono, and K. Ishibashi, “Proactive failure detection learning generation patterns of large-scale network logs,” Proc. 11th Int. Conf. Netw. Serv. Manag. CNSM 2015, pp. 8–14, 2015.
A. Aeri and S. Tukadiya, “A comparative study of network based system log Management tools,” 2015 Int. Conf. Comput. Commun. Informatics, pp. 1–6, 2015.
K. Rianafirin and M. T. Kurniawan, “Design Network Security Infrastructure Cabling Using Network Development Life Cycle Methodology and ISO/IEC 27000 Series in Yayasan Kesehatan (Yakes) Telkom Bandung,” in 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), 2017, pp. 1–6.
T. Rahman, “Jaringan Hotspot Menggunakan Dua Radius MikroTik dan Ethernet Over Internet Protocol Tunnel,” vol. 2, no. 2, pp. 135–148, 2018.
DOI: https://doi.org/10.30591/jpit.v4i2.1103
Refbacks
This work is licensed under a Creative Commons Attribution 4.0 International License.