Dr Anton Chuvakin Blog (Original)

This is Anton Chuvakin original blog (pre-Gartner) that I will now use to backup my Medium blog content (2023+)

Monday, November 05, 2007

On "Log Analysis Across System Boundaries for Security, Compliance and Operations"

My recent paper called "Log Analysis Across System Boundaries for Security, Compliance and Operations" is published. It is more on the "basics" side, but useful reading nonetheless. Read on!
Posted by Anton Chuvakin at 5:37 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: chuvakin, log management, logging, logs, paper, reading

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Dr Anton Chuvakin

Dr Anton Chuvakin

RSS Feed

Subscribe Follow @anton_chuvakin

Recent Books

My Links

  • "PCI Compliance" book site
  • My website
  • My old presentations
  • My old portal Info-Secure.org
  • Old "Security Warrior" Book Site

Twitter

    follow me on Twitter

    Top Popular Posts

    • The Last Blog Post!
      This is my last blog post –for the foreseeable future. It is dated 7/31/2011 at 11:59PM. What happens tomorrow? A new life, of course! As...
    • Simple Log Review Checklist Released!
      Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exc...
    • Why No Open Source SIEM, EVER?
      Here is a perfect weekend post – on SIEM :-) Ok, all this Google web traffic of people searching for “ open source SIEM ” (sometimes “ ope...
    • Monthly Blog Round-Up – January 2018
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts based on last month’s visitor data  (excluding o...
    • Monthly Blog Round-Up – May 2017
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “New SIEM Whitepaper on Use C...

    Topics

    security (1012) log management (340) logging (308) compliance (234) PCI (187) logs (176) security management (129) reading (121) Monthly (119) conference (117) personal (95) blogging (92) trends (91) SIEM (89) humor (86) musings (83) presentation (75) SIM (67) SEM (64) future (46) news (46) malware (40) stupidity (40) intrusion (37) predictions (36) chuvakin (35) poll (31) RSA (30) standards (30) book (29) market (29) incident (28) SANS (27) paper (27) loglogic (26) risk (24) tips (23) warfare (23) CEE (19) PCI_Log_Review (19) marketing (19) Medium (17) TysonRhame (17) vendors (17) research (16) ROI (15) vulnerability (15) cloud (14) honeynet (14) privacy (14) 2010 (13) book review (13) forensics (13) metrics (12) Annual (11) jobs (11) review (10) 2009 (9) DLP (9) Medium Backup (9) data protection (9) podcast (9) websec (9) business (8) economics (8) saas (8) strategy (8) webinar (8) awareness (7) insiders (7) legal (7) 2008 (6) BlackHat (6) Detection Engineering (6) Gartner (6) attack (6) LogChat (5) career (5) consulting (5) database (5) haiku (5) myth (5) product management (5) qualys (5) security theater (5) software (5) virtual (5) 2007 (4) FAIL (4) application (4) encryption (4) incident response (4) mistakes (4) search (4) travel (4) virtualization (4) visualization (4) web logs (4) windows (4) 2011 (3) DRM (3) GRC (3) NIST (3) audit (3) awesomeness (3) correlation (3) government (3) interview (3) intrusion detection (3) open source (3) perimeter (3) politics (3) pontification (3) questions (3) vulnerability management (3) 2012 (2) HIPAA (2) ShmooCon (2) access (2) best practices (2) competitive (2) cybercrime (2) e-discovery (2) evangelism (2) glossary (2) keynote (2) knowledge management (2) new (2) rootkit (2) stratfor (2) tools (2) twitter (2) 0day (1) 2013 (1) 2019 (1) 2020 (1) Android (1) Cloud Threats (1) EMAP (1) IANS (1) IPv6 (1) SOC (1) analogy (1) announcements (1) architecture (1) authentication (1) blo (1) comments (1) computers (1) controversy (1) cool (1) current (1) data mining (1) fraud (1) geopolitics (1) guest post (1) identity (1) innovation (1) linux (1) mobile (1) obvious (1) platform (1) policy (1) reflections (1) semantic (1) storage (1) video (1) whitepaper (1)

    About Me

    Anton Chuvakin
    View my complete profile

    Blog Archive

    • ►  2024 (18)
      • ►  December (2)
      • ►  October (2)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (5)
      • ►  February (2)
      • ►  January (1)
    • ►  2023 (8)
      • ►  December (1)
      • ►  November (2)
      • ►  October (5)
    • ►  2019 (1)
      • ►  July (1)
    • ►  2018 (7)
      • ►  August (2)
      • ►  June (1)
      • ►  May (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2017 (12)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2016 (14)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2015 (15)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (3)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2014 (14)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (3)
      • ►  February (1)
      • ►  January (1)
    • ►  2013 (15)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2012 (25)
      • ►  December (3)
      • ►  November (2)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (3)
      • ►  June (2)
      • ►  May (2)
      • ►  April (2)
      • ►  March (2)
      • ►  February (2)
      • ►  January (2)
    • ►  2011 (68)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (12)
      • ►  June (4)
      • ►  May (8)
      • ►  April (6)
      • ►  March (10)
      • ►  February (8)
      • ►  January (13)
    • ►  2010 (137)
      • ►  December (22)
      • ►  November (12)
      • ►  October (6)
      • ►  September (11)
      • ►  August (15)
      • ►  July (7)
      • ►  June (6)
      • ►  May (10)
      • ►  April (10)
      • ►  March (14)
      • ►  February (15)
      • ►  January (9)
    • ►  2009 (193)
      • ►  December (11)
      • ►  November (12)
      • ►  October (23)
      • ►  September (16)
      • ►  August (15)
      • ►  July (13)
      • ►  June (18)
      • ►  May (11)
      • ►  April (20)
      • ►  March (19)
      • ►  February (14)
      • ►  January (21)
    • ►  2008 (311)
      • ►  December (18)
      • ►  November (20)
      • ►  October (23)
      • ►  September (15)
      • ►  August (19)
      • ►  July (19)
      • ►  June (22)
      • ►  May (28)
      • ►  April (45)
      • ►  March (27)
      • ►  February (33)
      • ►  January (42)
    • ▼  2007 (479)
      • ►  December (21)
      • ▼  November (44)
        • Monthly Blog Round-Up - November 2007
        • "High-level" vs Fluffy vs Dumb vs Irrelevant?
        • Anton Security Tip of the Day #13: Into the Darkne...
        • On Security Marketing
        • Fun Logging Event: InfoSec World 2008 Log Managem...
        • Who Benefits from Log Standards? Part I - Log Mana...
        • A Bit of Ego-Googling
        • Risk vs Risk
        • Poll: What Do You Do With Collected Logs?
        • How Do You Predict The Future?!
        • Interesting Post: Tracking Install/Uninstall Thru ...
        • New Paper: "Computer forensics in the age of compl...
        • Nobody Is That Dumb ... Oh, Wait X
        • On "The 7 Reasons why Businesses are Insecure!"
        • Logs -> Metrics
        • TJX "Compliant" Until Dec 2008
        • On Satellite Warfare
        • Some People Ask Me ...
        • Another Old Presentation: NIST 800-92 Log Manageme...
        • Anybody Cares to Share a Copy of This?
        • On "Passing PCI Subversively"
        • Hmmmm....
        • New Honeynet Paper Out: "Know Your Enemy: Behind t...
        • Prediction Season is Upon Us! Arghhh!
        • Logging Poll #2 Analysis
        • Full Paper on Database Log Management Posted
        • My Next SANS Lunch and Learn:
        • A Desperate Plea ...
        • What Would be "DRM Good News"?
        • More On Armed Robots
        • Nobody Is That Dumb ... Oh, Wait IX
        • Protecting Logs from Admins: A Lost Battle?
        • Insider Mom Musings
        • Log Management "Strategy:" Built ->Suffer->Suffer-...
        • More Insider Threat Fun :-)
        • On "Log Analysis vs. Insider Attacks"
        • On "Log Analysis Across System Boundaries for Sec...
        • Interesting Log Survey Report
        • Anomaly Detection Failures?
        • But Will YOU Detect It?
        • Ideal Log Management Tool?
        • Monthly Blog Round-Up - October 2007
        • And Whatever ...
        • Richard On "Proving" Security
      • ►  October (57)
      • ►  September (57)
      • ►  August (51)
      • ►  July (49)
      • ►  June (34)
      • ►  May (39)
      • ►  April (21)
      • ►  March (30)
      • ►  February (30)
      • ►  January (46)
    • ►  2006 (370)
      • ►  December (24)
      • ►  November (25)
      • ►  October (24)
      • ►  September (31)
      • ►  August (34)
      • ►  July (31)
      • ►  June (23)
      • ►  May (20)
      • ►  April (52)
      • ►  March (41)
      • ►  February (33)
      • ►  January (32)
    • ►  2005 (34)
      • ►  December (34)

    Labels and Tags

    Copyright Anton Chuvakin. Simple theme. Powered by Blogger.