Published Online:February 2025
Product Name:The IUP Journal of Telecommunications
Product Type:Article
Product Code:IJTC030225
DOI:10.71329/IUPJTC/2025.17.1.54-74
Author Name:Fidelis I Onah and Samuel Ukoha
Availability:YES
Subject/Domain:Engineering
Download Format:PDF
Pages:54-74
As multiple log files are produced from an increasing number of network devices and applications in today’s data-driven world, extracting valuable information from varied sources and application protocols in real-time is a growing concern. This study provides a thirdparty utility program to collect, prioritize, transmit, compress, delete, archive, store and analyze anonymized log data emanating from user-owned laptops, servers, firewalls, routers, databases and business applications throughout the network. The user interfaces were created using Javafx. Java programming language interfaced with Python was used for the logical parts, and H2 development tool was used for the database. The application supports the operating systems’ logging and alerting mechanisms. It incorporates a visualization tool for searching, correlating, alerting and analysis of timestamped company log data. Since all log messages are stored in the same place and not on different devices, interpretation of data takes less time, effort and money. The digital fingerprints also enable network administrators, supervisors, decision makers and regulatory agencies to better visualize network operations, detect problems within the network and block security breaches. Log profiles, over time, can be viewed and assessed via a more human-readable format, such as graphs, charts or tables, which can be exported to a spreadsheet for further manipulation. These presentations are obviously crucial for real-time forensic investigation, regulatory compliance and audit trailing.
End users of virtual private networks (VPNs) desire anonymized zero log services to stay protected from hackers or snoopers. However, VPNs are no more invisible and unbreakable as earlier intended. Therefore, VPN providers must keep granular audit records to investigate and learn from security incidents, improve device or network operations, make money from advertisements placed on commonly visited websites, and improve accountability of business operations. To ensure their confidentiality and integrity, however, the log messages are encrypted and hashed.