CERN Accelerating science

CERN Document Server 3 records found  Search took 0.82 seconds. 
1.
LHCb Online Log Analysis and Maintenance System / Garnier, J-C (CERN) ; Brarda, L (CERN) ; Neufeld, N (CERN) ; Nikolaidis, F (CERN)
History has shown, many times computer logs are the only information an administrator may have for an incident, which could be caused either by a malfunction or an attack. Due to the huge amount of logs that are produced from large-scale IT infrastructures, such as LHCb Online, critical information may be overlooked or simply be drowned in a sea of other messages. [...]
2011 - Published in : Conf. Proc.: C111010 (2011) , pp. THCHAUST05 Published version from JaCoW: PDF;
In : 13th International Conference on Accelerator and Large Experimental Physics Control Systems, Grenoble, France, 10 - 14 Oct 2011, pp.1228-1231
2.
A Universal Logging System for LHCb Online / Nikolaidis, Fotios (CERN) ; Brarda, Loïc (CERN) ; Garnier, Jean-Christophe (CERN) ; Neufeld, Niko (CERN)
A log is recording a system’s activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. [...]
LHCb-PROC-2012-010; CERN-LHCb-PROC-2012-010.- Geneva : CERN, 2012 - 6 p. Fulltext: PDF;
In : Conference on Computing in High Energy and Nuclear Physics 2010, Taipei, Taiwan, 18 - 22 Oct 2010
3. LHCb: Universal Logging System for LHCb
Reference: Poster-2010-162
Note: Linked to LHCb-PROC-2012-010
Created: 2010. -1 p
Creator(s): Nikolaidis, F; Brarda, L; Garnier, J-C; Neufeld, N

In a large-scale IT infrastructure such as the LHCb Online system many applications are running on thousands of machines producing many GBs of logs every day. Although most of the logs are just routine logs, some of them may indicate an attack, a malfunction or provide vital debugging information. Due to their volume only automatisation of the analysis of the logs can provide us with an efficient way to handle all of these logs, ensuring that even the most rare logs will be processed. We present a centralized logging system which allow us to do in-depth analysis of every log. The description of the architecture includes information from how we integrate logging from many devices to a centralized server using syslog and in particular how a correlation can indicate an attack. Special emphasis is given both to security monitoring as well as to the logs that indicate developing malfunctions. To secure our network we have deployed the most known of HIDS, NIDS , LIDS (Host , Network, Log intrusion detection). Each one of them was configured both to cover our needs and communicate with other tools. In some cases , in addition to f configuring the tools, modification to their source code was needed. These modifications are described. Finally we evaluate our work on the performance on live data from our system and show how the predefined requirements are met. We present performance figures, resources needed for the tools and include a comparative study of various tools.

Related links:
Conference: CHEP 2010
© CERN Geneva

Fulltext

Veja também: nomes de autores similares
1 Nikolaidis, Fotios
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.
Haven't found what you were looking for? Try your search on other servers:
Nikolaidis, F em Amazon
Nikolaidis, F em CERN EDMS
Nikolaidis, F em CERN Intranet
Nikolaidis, F em CiteSeer
Nikolaidis, F em Google Books
Nikolaidis, F em Google Scholar
Nikolaidis, F em Google Web
Nikolaidis, F em IEC
Nikolaidis, F em IHS
Nikolaidis, F em INSPIRE
Nikolaidis, F em ISO
Nikolaidis, F em KISS Books/Journals
Nikolaidis, F em KISS Preprints
Nikolaidis, F em NEBIS
Nikolaidis, F em SLAC Library Catalog
Nikolaidis, F em Scirus