Log Analysis



The objectives of this chapter are to:


Security Information And Event Management Systems (SIEM) Rsyslog Host Intrusion Detection System (HIDS) Syslog Messages Windows Event Log 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
  2. 2.
    D. V. Forte, The “Art” of log correlation: Tools and Techniques for Correlating Events and Log Files. Computer Fraud & Security, Vol. 2004, No. 8, pp. 15–17, August 2004.CrossRefGoogle Scholar
  3. 3.
  4. 4.
    N. M. Ibrahim, A. Al-Nemrat, H. Jahankhani, R. Bashroush. Sufficiency of Windows Event log as Evidence in Digital Forensics. Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3). Greece, August 2011.Google Scholar
  5. 5.
  6. 6.
  7. 7.
  8. 8.
  9. 9.
  10. 10.
  11. 11.
    Seyed Morteza Zeinali. Analysis of security information and event management (siem) evasion and detection methods. Master Thesis, Tallinn University of Technology, 2016Google Scholar
  12. 12.
    Security Enhanced Linux (SELinux).
  13. 13.
  14. 14.
    Network Intelligence Corporation.

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Department of Physics and Computer Science, Faculty of ScienceWilfrid Laurier UniversityWaterlooCanada

Personalised recommendations