Django middleware and signals for handling security events
-
Updated
Apr 14, 2021 - Python
Django middleware and signals for handling security events
Webhawk/Catch helps automatically finding web attack traces in logs
Shaley-Sand Log Analysis Tutorial using Waxman-Smits and Dual-Water
A python script to search a file for the user input | Return the previous, current and next line of the searched input | Write the current line into a new file
A paper list of awesome research on load balancing monitoring data analysis, log analysis, decision scheduling, and AIOps.
A cybersecurity solution that leverages the power of artificial intelligence and machine learning to accurately classify incoming network traffic based on the tactics employed by potential attackers. The system is trained using data gathered from a Cowrie honeypot deployed in the cloud.
Kubernetes configurations for deploying Elasticsearch and Kibana. Simplify log analysis with this scalable and efficient setup.
Estimating formation total porosity using Archie's Equation
Smart dashboard developed in MS Power BI to analyze and monitor logs of a specific bank department
A Java-based application designed to streamline the process of filtering and analyzing server logs efficiently from MongoDB
"GuardianEye ππ: Empowering Cybersecurity with Advanced Keylogger β A robust defense system providing comprehensive monitoring of employee activities, capturing keystrokes, screenshots, application logs, and system logs for proactive threat detection and enhanced security insights in modern business operations. π‘οΈπ»
Add a description, image, and links to the loganalysis topic page so that developers can more easily learn about it.
To associate your repository with the loganalysis topic, visit your repo's landing page and select "manage topics."