Skip to main content

Log Analysis

  • Chapter
  • First Online:
Introductory Computer Forensics
  • 167k Accesses

Abstract

The objectives of this chapter are to:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Basics of Forensics Log Analysis. https://www.paladion.net/blogs/basics-of-forensics-log-analysis

  2. D. V. Forte, The “Art” of log correlation: Tools and Techniques for Correlating Events and Log Files. Computer Fraud & Security, Vol. 2004, No. 8, pp. 15–17, August 2004.

    Article  Google Scholar 

  3. Event Correlation across Log Files: What is it and Why is it Important? https://www.accenture.com/us-en/blogs/blogs-event-correlation-across-log-files-what-is-it-and-why-is-it-important

  4. N. M. Ibrahim, A. Al-Nemrat, H. Jahankhani, R. Bashroush. Sufficiency of Windows Event log as Evidence in Digital Forensics. Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3). Greece, August 2011.

    Google Scholar 

  5. The Syslog Protocol. https://tools.ietf.org/html/rfc5424

  6. https://syslog-ng.com/

  7. https://www.rsyslog.com/

  8. How to set up Syslog-ng server on Debian. http://oscarhjelm.com/blag/2013/02/how-to-set-up-syslog-ng-server-on-debian/

  9. https://www.alienvault.com/products/ossim

  10. http://www3.ntu.edu.sg/home/ehchua/programming/sql/mysql_howto.html

  11. Seyed Morteza Zeinali. Analysis of security information and event management (siem) evasion and detection methods. Master Thesis, Tallinn University of Technology, 2016

    Google Scholar 

  12. Security Enhanced Linux (SELinux). https://github.com/SELinuxProject

  13. https://www.accenture.com/us-en/blogs/blogs-event-correlation-across-log-files-what-is-it-and-why-is-it-important

  14. Network Intelligence Corporation. http://www.network-intelligence.com

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X. (2018). Log Analysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00581-8_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00580-1

  • Online ISBN: 978-3-030-00581-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics