SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Log Mining: Beyond Log Analysis

by Principal at Security Warrior Consulting on Sep 27, 2007

  • 25,646 views

The presentation will describe methods for discovering interesting and actionable patterns in log files for security management without specifically knowing what you are looking for. This approach is ...

The presentation will describe methods for discovering interesting and actionable patterns in log files for security management without specifically knowing what you are looking for. This approach is different from "classic" log analysis and it allows gaining an insight into insider attacks and other advanced intrusions, which are extremely hard to discover with other methods. Specifically, I will demonstrate how data mining can be used as a source of ideas for designing future log analysis techniques, that will help uncover the coming threats. The important part of the presentation will be the demonstration how the above methods worked in a real-life environment.

Statistics

Views

Total Views
25,646
Views on SlideShare
25,341
Embed Views
305

Actions

Likes
26
Downloads
0
Comments
0

17 Embeds 305

http://seguridad-informacion.blogspot.com 203
http://www.slideshare.net 33
http://seguridad-informacion.blogspot.com.ar 28
http://seguridad-informacion.blogspot.mx 15
http://seguridad-informacion.blogspot.com.es 6
https://mammothhq.com 4
http://seguridad-informacion.blogspot.com.br 3
https://twitter.com 2
http://seguridad-informacion.blogspot.fi 2
http://10.50.10.9 2
http://webcache.googleusercontent.com 1
http://seguridad-informacion.blogspot.in 1
http://seguridad-informacion.blogspot.de 1
http://translate.googleusercontent.com 1
http://www.blogger.com 1
http://anonymouse.org 1
http://seguridad-informacion.blogspot.co.uk 1
More...

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Log Mining: Beyond Log Analysis Log Mining: Beyond Log Analysis Presentation Transcript