ITERATIVE LOG ANALYSIS TOOL FOR VISUAL REPRESENTATION IN DETECTING MALICIOUS ACTIVITIES

Find us on Google Scholar
Peer Review Policy
Article Processing Charges
Publication Procedure
Research Topics
FAQ
Copyright Infringement
Refund and Cancellation Policy
[featured_image]
Download
Download is available until [expire_date]
  • Version
  • Download 12
  • File Size 318.80 KB
  • File Count 1
  • Create Date 14/03/2026
  • Last Updated 14/03/2026

ITERATIVE LOG ANALYSIS TOOL FOR VISUAL REPRESENTATION IN DETECTING MALICIOUS ACTIVITIES

ITERATIVE LOG ANALYSIS TOOL FOR VISUAL REPRESENTATION IN DETECTING MALICIOUS ACTIVITIES

 

S.Saravana Kumar, Department of CSE (Cyber Security), Dr.Mahalihngam College of Engineering and Technology, Coimbatore, India

saravanacs84@gmail.com

P.Harishini, Department of CSE (Cyber Security), Dr.Mahalingam College of Engineering and Technology, Coimbatore, India

harishiniraj2020@gmail.com

Sathya Shalini, Department of CSE (Cyber Security), Dr.Mahalingam College of Engineering and Technology, Coimbatore, India

vijayakumart@drmcet.ac.in

Dr. P. Vivekanandan, Department of CSE (Cyber Security), Dr.Mahalingam College of Engineering and Technology, Coimbatore, India

drpvivekanandan@gmail.com

 

Abstract

Log analysis is the process of converting raw or unstructured log files into structured data and making intelligent decisions on that structured data. In every field like software testing, the analysis of log files is designed to monitor and check application performance. Logs are unstructured text lines containing systematic information regarding application work and actions such as IP Address, date, time, viewed sites, potential domains, status code, components, levels, nodes, query information, loading-time, user-agent, and port-number. Logs include several types such as INFO, WARNING, FATAL, SEVERE, and ERROR. The Log Analyzer Tool is a Python-based application designed to analyze log files for suspicious activities including malware, unauthorized access, phishing attempts, file tampering, security breaches, and more. The tool works across macOS, Windows, and Linux, offering a user-friendly graphical interface for log file selection and scan initiation. This project represents an industry-level, production-grade solution that strengthens cybersecurity infrastructure, reduces manual monitoring efforts, improves incident response time, enhances system reliability, and protects sensitive digital assets.

Keywords System Monitoring, Log File Analytics, Performance Analysis, Security Event Detection, Visual Representation

Follow Us

Google Scholar

ResearchGate

Facebook

Instagram

Working Hours

Mon – Sat: 9:00 AM – 6:00 PM

Sunday: 9:00 AM – 1:00 PM

📧 editor@ijsrem.com

📞 +91 93911 67991

Contact Us

International Journal of Scientific Research in Engineering and Management (IJSREM)

📍 #62/1, New No 7, 1st Cross, 2nd Main,
Ganganagar, R T Nagar, Bangalore North,
Bangalore, Karnataka, India – 560032

Visit Contact Page