security log analysis - ideals analysis & splunk.pdfwe thank the national science foundation...
TRANSCRIPT
Security Log Analysis
Background
●
○
○
●
Why log analysis?
●
●
●
Defining “logs” and “log analysis”
●
○
●
○
○
○
○
Log collection sources
●
○
●
○
●
○
Log collection sources, cont.
●
●
●
○
○
○
Artwork: http://hyperboleandahalf.blogspot.com/2010/06/this-is-why-ill-never-be-adult.html
Event Management - Questions
●
●
●
●
●
●
Event Management - Guidelines
●
●
●
●
○
■
■
Analysis and Response
●
○
○
○
○
●
Getting Started
●
○
○
○
●
Blue Waters Supercomputer https://bluewaters.ncsa.illinois.edu/
●
●
●
●
●
●
●
●
●
Apache Log Format
Basic Command Pattern
http://blog.ferplast.com/en/how-to-raise-a-hamster/
One Last Note
●
●
○
●
○ ☺
We thank the National Science Foundation (grant 1547272) for supporting our work.
The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the NSF.