Log Correlation: Tools and Techniques

Log Correlation: Tools and Techniques

Dario Valentino Forete (CFE, CISM, Italy)
Copyright: © 2006 |Pages: 31
DOI: 10.4018/978-1-59140-872-7.ch006
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct disciplines is one of the best guarantees against Points of Failure. This chapter is organized as a tutorial for practitioners, providing an overview of log analysis and correlation, with special emphasis on the tools and techniques for handling them in a forensically compliant manner.

Complete Chapter List

Search this Book:
Reset