O'Reilly logo

Network Forensics: Tracking Hackers through Cyberspace by Jonathan Ham, Sherri Davidoff

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Event Log Aggregation, Correlation, and Analysis

“They seem to have a fundamental misunderstanding of the Internet: nothing is too trivial.”

—Philip Lisiecki, MIT1

1. Robert J. Sales, “Random Hall residents monitor one of MIT’s most-washed web sites—MIT News Office,” April 14, 1999, http://web.mit.edu/newsoffice/1999/laundry-0414.html.

Application servers, routers, firewalls, network devices, cameras, HVAC systems, and all kinds of other devices generate event logs. Event logs are simply selected records that provide information about the state of the system and/or environment at a given time. Different types of devices generate different types of event logs. Event logs may include information about system access (such as server logins ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required