hi, There is many new log files in our network systems every day,including www logs,ids logs,firewall logs and OS's logs etc. The administrator must audit those log files with log analysis tools to check if their networks is intruded.But there is a few log tool to analyse the log relativity(or correlation).It is difficult for discovery the distributed attack. Can we discuss the log relativity analysis here?You also give the correlative title(or paper) link.I will apperiate anybody who join to discuss the problem. regards, Tony _______________________________________________ LogAnalysis mailing list LogAnalysisat_private http://lists.shmoo.com/mailman/listinfo/loganalysis
This archive was generated by hypermail 2b30 : Thu Sep 05 2002 - 06:35:01 PDT