Network and system administrator should monitor log files for maintaining control over services he/she offers to users. This is a difficult task since it is necessary to completely understand log file format; moreover information on a single transaction is often spread on different lines. Another problem commonly found is represented by data mining operation which should be performed to extract important data from the whole (noise). All above problems are found when dealing with mail servers: we analyzed postfix and sendmail log file and created a tool, log mail analyzer aka LMA, for comprehensive analysis. LMA parses mail-log files, extracts information on each transaction and dumps records using BerkeleyDB or a different DataBase Management System like Mysql. Various type of query, both on BekeleyDB and sql language are supported: through these queries it is possible to adopt an anomaly based approach for intrusion detection purposes. In fact it is well known that viruses and worms propagate also using e-mails. Having a tool for clear understanding and monitoring smtp transaction may help in manager security tasks. LMA is written in Perl for portability reason and is available at http://sourceforge.net/projects/lma/

LMA - Log Mail Analyzer

M Aiello;G Papaleo;D Chiarella
2007

Abstract

Network and system administrator should monitor log files for maintaining control over services he/she offers to users. This is a difficult task since it is necessary to completely understand log file format; moreover information on a single transaction is often spread on different lines. Another problem commonly found is represented by data mining operation which should be performed to extract important data from the whole (noise). All above problems are found when dealing with mail servers: we analyzed postfix and sendmail log file and created a tool, log mail analyzer aka LMA, for comprehensive analysis. LMA parses mail-log files, extracts information on each transaction and dumps records using BerkeleyDB or a different DataBase Management System like Mysql. Various type of query, both on BekeleyDB and sql language are supported: through these queries it is possible to adopt an anomaly based approach for intrusion detection purposes. In fact it is well known that viruses and worms propagate also using e-mails. Having a tool for clear understanding and monitoring smtp transaction may help in manager security tasks. LMA is written in Perl for portability reason and is available at http://sourceforge.net/projects/lma/
Campo DC Valore Lingua
dc.authority.people M Aiello it
dc.authority.people G Papaleo it
dc.authority.people D Chiarella it
dc.collection.id.s 0eb59f44-272f-44ea-92c6-fc0b22b80076 *
dc.collection.name 05.11 Software *
dc.contributor.appartenenza Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT *
dc.contributor.appartenenza Istituto di linguistica computazionale "Antonio Zampolli" - ILC *
dc.contributor.appartenenza.mi 877 *
dc.contributor.appartenenza.mi 918 *
dc.date.accessioned 2024/02/15 17:09:24 -
dc.date.available 2024/02/15 17:09:24 -
dc.date.issued 2007 -
dc.description.abstracteng Network and system administrator should monitor log files for maintaining control over services he/she offers to users. This is a difficult task since it is necessary to completely understand log file format; moreover information on a single transaction is often spread on different lines. Another problem commonly found is represented by data mining operation which should be performed to extract important data from the whole (noise). All above problems are found when dealing with mail servers: we analyzed postfix and sendmail log file and created a tool, log mail analyzer aka LMA, for comprehensive analysis. LMA parses mail-log files, extracts information on each transaction and dumps records using BerkeleyDB or a different DataBase Management System like Mysql. Various type of query, both on BekeleyDB and sql language are supported: through these queries it is possible to adopt an anomaly based approach for intrusion detection purposes. In fact it is well known that viruses and worms propagate also using e-mails. Having a tool for clear understanding and monitoring smtp transaction may help in manager security tasks. LMA is written in Perl for portability reason and is available at http://sourceforge.net/projects/lma/ -
dc.description.affiliations M. Aiello - CNR IEIIT G. Papaleo - CNR IEIIT D. Chiarella - CNR IEIIT -
dc.description.allpeople M. Aiello ; G. Papaleo ; D. Chiarella -
dc.description.allpeopleoriginal M. Aiello ; G. Papaleo ; D. Chiarella -
dc.description.fulltext none en
dc.description.numberofauthors 3 -
dc.identifier.uri https://hdl.handle.net/20.500.14243/450 -
dc.identifier.url http://sourceforge.net/projects/lma/ -
dc.language.iso ita -
dc.language.iso eng -
dc.title LMA - Log Mail Analyzer en
dc.type.driver info:eu-repo/semantics/other -
dc.type.full 05 Altro::05.11 Software it
dc.type.miur 296 -
dc.ugov.descaux1 184212 -
iris.orcid.lastModifiedDate 2024/03/02 04:08:28 *
iris.orcid.lastModifiedMillisecond 1709348908658 *
iris.sitodocente.maxattempts 1 -
Appare nelle tipologie: 05.11 Software
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/450
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact