Chapter 17

Attacks Against Logging Systems

Information in this chapter:

ent Attacks

ent Attack Case Study

Introduction

A robust log analysis system relies on the integrity of the log data being analyzed. The system has to be resilient to attempts to modify and delete data. On top of this, it also has to allow granular access control to log data. If log data is to be used as evidence in a legal context, the ability to demonstrate the integrity of log data may have an effect on whether or not the data is considered acceptable evidence. This chapter explores ...

Get Logging and Log Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.