IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Log Correlation: Tools and Techniques

Log Correlation: Tools and Techniques
View Sample PDF
Author(s): Dario Valentino Forete (CFE, CISM, Italy)
Copyright: 2006
Pages: 31
Source title: Digital Crime and Forensic Science in Cyberspace
Source Author(s)/Editor(s): Panagiotis Kanellis (Information Society S.A., Greece), Evangelos Kiountouzis (Athens University, Greece), Nicholas Kolokotronis (Universitiy of Peloponnese, Greece)and Drakoulis Martakos (National and Kapodistrian University of Athens, Greece)
DOI: 10.4018/978-1-59140-872-7.ch006

Purchase

View Log Correlation: Tools and Techniques on the publisher's website for pricing and purchasing information.

Abstract

Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct disciplines is one of the best guarantees against Points of Failure. This chapter is organized as a tutorial for practitioners, providing an overview of log analysis and correlation, with special emphasis on the tools and techniques for handling them in a forensically compliant manner.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom