Log Correlation: Tools and Techniques

Log Correlation: Tools and Techniques

Dario Valentino Forete (CFE, CISM, Italy)
Copyright: © 2006 |Pages: 31
DOI: 10.4018/978-1-59140-872-7.ch006
OnDemand PDF Download:
$37.50

Abstract

Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct disciplines is one of the best guarantees against Points of Failure. This chapter is organized as a tutorial for practitioners, providing an overview of log analysis and correlation, with special emphasis on the tools and techniques for handling them in a forensically compliant manner.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Kyriakos Tsiflakos
Preface
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Acknowledgments
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Chapter 1
Thomas M. Chen, Chris Davis
This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A... Sample PDF
An Overview of Electronic Attacks
$37.50
Chapter 2
Steven Furnell, Jeremy Ward
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This... Sample PDF
Malware: An Evolving Threat
$37.50
Chapter 3
Sriranjani Sitaraman, Subbarayan Venkatesan
This chapter introduces computer and network forensics. The world of forensics is well understood in the non-digital world, whereas this is a... Sample PDF
Computer and Network Forensics
$37.50
Chapter 4
III Richard, Vassil Roussev
Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and... Sample PDF
Digital Forensic Tools: The Next Generation
$37.50
Chapter 5
Philip Craiger, Jeff Swauger, Chris Marberry, Connie Hendricks
An important result of the U.S. Supreme Courts Daubert decision is that the digital forensic tools must be validated if the results of examinations... Sample PDF
Validation of Digital Forensic Tools
$37.50
Chapter 6
Dario Valentino Forete
Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct... Sample PDF
Log Correlation: Tools and Techniques
$37.50
Chapter 7
Pallavi Kahai, Kamesh Namuduri, Ravi Pense
Security incidents that threaten the normal functioning of the organization are on the rise. In order to resist network attacks most organizations... Sample PDF
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
$37.50
Chapter 8
Caroline Chibelushi, Bernadette Sharp, Hanifa Shah
The advancement of multimedia and communication systems has not only provided faster and better communication facilities but also facilitated easier... Sample PDF
ASKARI: A Crime Text Mining Approach
$37.50
Chapter 9
Sos S. Agaian, Benjamin M. Rodriguez
This chapter focuses on the development of digital forensic steganalysis tools/methods through analysis and evaluation of the most popular “sample... Sample PDF
Baseic Steganalysis for the Digital Media Forensics Examiner
$37.50
Chapter 10
Warren Wylupski, David R. Champion, Zachary Grant
One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network... Sample PDF
Incident Preparedness and Response: Devlopming a Security Policy
$37.50
Chapter 11
S.H. (Basie) von Solms, C.P. (Buks) Louwrens
The purpose of this chapter is twofold: Firstly, we want to determine the relationships, if any, between the discipline of digital forensics and the... Sample PDF
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
$37.50
Chapter 12
Andreas Mitrakas, Damián Zaitch
The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal... Sample PDF
Law, CyberCrime and Digital Forensics: Trailing Digital Suspects
$37.50
Chapter 13
Bernd Carsten Stahl, Moira Carroll-Mayer, Peter Norris
In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals.... Sample PDF
Forensic Computing: The Problem of Developing a Multidisciplinary University Course
$37.50
Chapter 14
Christopher Malinowski
This chapter considers and presents training possibilities for computer forensic investigators. The author differentiates between civil service and... Sample PDF
Training the Cyber Investigator
$37.50
Chapter 15
Michael A. Caloyannides
Digital data increasingly presented in courts as evidence is mistakenly viewed by judges and juries as inherently unalterable. In fact, digital data... Sample PDF
Digital "Evidence" is Often Evidence of Nothing
$37.50
About the Authors