Abstract
The objectives of this chapter are to:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Basics of Forensics Log Analysis. https://www.paladion.net/blogs/basics-of-forensics-log-analysis
D. V. Forte, The “Art” of log correlation: Tools and Techniques for Correlating Events and Log Files. Computer Fraud & Security, Vol. 2004, No. 8, pp. 15–17, August 2004.
Event Correlation across Log Files: What is it and Why is it Important? https://www.accenture.com/us-en/blogs/blogs-event-correlation-across-log-files-what-is-it-and-why-is-it-important
N. M. Ibrahim, A. Al-Nemrat, H. Jahankhani, R. Bashroush. Sufficiency of Windows Event log as Evidence in Digital Forensics. Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3). Greece, August 2011.
The Syslog Protocol. https://tools.ietf.org/html/rfc5424
How to set up Syslog-ng server on Debian. http://oscarhjelm.com/blag/2013/02/how-to-set-up-syslog-ng-server-on-debian/
http://www3.ntu.edu.sg/home/ehchua/programming/sql/mysql_howto.html
Seyed Morteza Zeinali. Analysis of security information and event management (siem) evasion and detection methods. Master Thesis, Tallinn University of Technology, 2016
Security Enhanced Linux (SELinux). https://github.com/SELinuxProject
Network Intelligence Corporation. http://www.network-intelligence.com
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, X. (2018). Log Analysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-00581-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00580-1
Online ISBN: 978-3-030-00581-8
eBook Packages: Computer ScienceComputer Science (R0)