Log Correlation: Tools and Techniques

Log Correlation: Tools and Techniques

Dario Valentino Forete (CFE, CISM, Italy)
Copyright: © 2006 |Pages: 31
DOI: 10.4018/978-1-59140-872-7.ch006
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct disciplines is one of the best guarantees against Points of Failure. This chapter is organized as a tutorial for practitioners, providing an overview of log analysis and correlation, with special emphasis on the tools and techniques for handling them in a forensically compliant manner.

Complete Chapter List

Search this Book: