Monitoring Application Use with License Server Logs

  • Authors:
  • Jon Finke

  • Affiliations:
  • Rensselaer Polytechnic Institute

  • Venue:
  • LISA '97 Proceedings of the 11th USENIX conference on System administration
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Determining how you were attacked is essential to developing a response or countermeasure. Usually, a system or network manager presented with a successful intrusion has very little information with which to work: a possibly corrupted system log, a firewall ...