As promised, below are a few of my own favorite resources on log analysis. Probably the top folks in the industry today working on the log analysis problem are Tina Bird, Marcus Ranum, and Anton Chuvakin. I've had the privilege of attending talks/classes by each of them at SANS conferences, I hope they'll be teaching more of them in the near future.
ResourcesThe log analysis mailing list - http://lists.shmoo.com/mailman/listinfo/loganalysisThe log analysis web site created by Marcus Ranum and Tina Bird - http://www.loganalysis.org/ SEC (Simple Event Correlator), which I once described to SANS instructor David Hoelzer as "swatch on steroids" - http://kodu.neti.ee/~risto/sec/ and the SEC rules being collected by the Bleeding Snort project at http://www.bleedingsnort.com/sec/ (thanx to Matt Jonkman for reminding me of this). Marcus Ranum's nbs tool - http://www.ranum.com/security/computer_security/code/nbs.tar Logwatch - http://www.logwatch.org As promised, I'll share our reader's suggestions sometime next week. -------------------------- Jim Clausing, jclausing --at-- isc dot sans dot org I will be teaching next: Reverse-Engineering Malware: Malware Analysis Tools and Techniques - SANS Cyber Defence Australia 2022 |
Jim 423 Posts ISC Handler Sep 10th 2006 |
Thread locked Subscribe |
Sep 10th 2006 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!