Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
LOG ANALYZER
Author Name

Dr.K.P. MALARKODI, KRITHIKH J, ASHWIN V, THOLKAPPIAN SS

Abstract

           This Python program serves as a comprehensive log analysis tool designed to detect suspicious activities in system logs, making it especially useful for system administrators and cybersecurity professionals. The program leverages the tkinter library to create an intuitive graphical user interface (GUI), which allows users to upload log files for analysis. By using regular expressions (regex), the tool can identify a variety of security-related threats, including malware infections, unauthorized access attempts, data breaches, file tampering, phishing, and more. Each type of suspicious activity is detected based on predefined regex patterns, and for each activity detected, a corresponding remedy is provided. For example, if malware is detected, the suggested remedy might be to run a full system antivirus scan .The program's functionality extends beyond simple detection; it generates detailed text reports that summarize the analysis, listing detected activities along with their remedies. Additionally, it generates graphical representations of the analysis results using bar charts, which visually display the count of each suspicious activity detected in the log file. Another standout feature of this tool is its ability to allow users to define and add custom detection patterns. This is particularly valuable for detecting threats that may not be covered by the predefined patterns. Custom patterns can be added through the GUI, and these patterns are saved to a configuration file, ensuring persistence across sessions.

 

 

KEYWORDS:  

 Tkinter, GUI, Log File Analysis, Suspicious Activity Detection, Regex Patterns, Pattern Matching, Malware Detection, Phishing Detection, Data Breach Detection, Unauthorized Access, Log File Monitoring, Security Breach Detection, Matplotlib, Data Visualization and Custom Pattern Management.



Published On :
2025-03-21

Article Download :
Publish your academic thesis as a book with ISBN Contact – connectirj@gmail.com
Visiters Count :