Skip Abstract Section
Abstract
This document describes the observed behavior of the syslog protocol. This protocol has been used for the transmission of event notification messages across networks for many years. While this protocol was originally developed on the University of California Berkeley Software Distribution (BSD) TCP/IP system implementations, its value to operations and management has led it to be ported to many other operating systems as well as being embedded into many other networked devices.
RFC Downloads
ZIP
Cited By
- Bajramovic E, Fein C, Frinken M, Rösler P and Freiling F (2023). LAVA: Log Authentication and Verification Algorithm, Digital Threats: Research and Practice, 4:3, (1-17), Online publication date: 30-Sep-2023.
- Pecchia A, Cinque M, Carrozza G and Cotroneo D Industry practices and event logging Proceedings of the 37th International Conference on Software Engineering - Volume 2, (169-178)
- Rajiullah M, Lundin R, Brunstrom A and Lindskog S (2019). Performance analysis and improvement of PR-SCTP for small messages, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:18, (3967-3986), Online publication date: 1-Dec-2013.
- Turner D, Levchenko K, Savage S and Snoeren A A comparison of syslog and IS-IS for network failure analysis Proceedings of the 2013 conference on Internet measurement conference, (433-440)
- Wu X, Turner D, Chen C, Maltz D, Yang X, Yuan L and Zhang M (2012). NetPilot, ACM SIGCOMM Computer Communication Review, 42:4, (419-430), Online publication date: 24-Sep-2012.
- Wu X, Turner D, Chen C, Maltz D, Yang X, Yuan L and Zhang M NetPilot Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, (419-430)
- Zola E and Barcelo-Arroyo F A comparative analysis of the user behavior in academic WiFi networks Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, (59-66)
- Makanju A, Zincir-Heywood A and Milios E Storage and retrieval of system log events using a structured schema based on message type transformation Proceedings of the 2011 ACM Symposium on Applied Computing, (528-533)
- Turner D, Levchenko K, Snoeren A and Savage S California fault lines Proceedings of the ACM SIGCOMM 2010 conference, (315-326)
- Turner D, Levchenko K, Snoeren A and Savage S (2010). California fault lines, ACM SIGCOMM Computer Communication Review, 40:4, (315-326), Online publication date: 16-Aug-2010.
- Makanju A, Zincir-Heywood A and Milios E Clustering event logs using iterative partitioning Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (1255-1264)
- Monteiro S and Erbacher R (2019). An authentication and validation mechanism for analyzing syslogs forensically, ACM SIGOPS Operating Systems Review, 42:3, (41-50), Online publication date: 1-Apr-2008.
- Brandão J, da Silva Fraga J, Mafra P and Obelheiro R A WS-based infrastructure for integrating intrusion detection systems in large-scale environments Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I, (462-479)
- de Alfonso C, Caballer M, Carrión J and Hernández V Distributed general logging architecture for grid environments Proceedings of the 7th international conference on High performance computing for computational science, (589-600)
- Accorsi R and Hohl A Delegating secure logging in pervasive computing systems Proceedings of the Third international conference on Security in Pervasive Computing, (58-72)
- Cook D, Hartnett J, Manderson K and Scanlan J Catching spam before it arrives Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (193-202)
- Yamanishi K and Maruyama Y Dynamic syslog mining for network failure monitoring Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, (499-508)
- Wu J, Mao Z, Rexford J and Wang J Finding a needle in a haystack Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, (1-14)
- Ho C, Ramachandran K, Almeroth K and Belding-Royer E A scalable framework for wireless network monitoring Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (93-101)