This document discusses pre-processing of server log files to improve security in distributed database systems. It proposes storing the MAC address in server log files along with the IP address to better identify unauthorized users. It provides background on distributed databases and security issues when data is accessed over a network. The document also reviews related work on pre-processing log files and using data mining techniques like the Apriori algorithm and decision trees. The proposed method applies these techniques to optimize log file data, recognize patterns, and display clean log files with MAC addresses to help verify unauthorized clients.