
At a Glance
350 Pages
23.5 x 18.42 x 2.54
Paperback
$143.75
or 4 interest-free payments of $35.94 with
orShips in 15 to 25 business days
Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of "log file." This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.
* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network
* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site.
* Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
| Foreword | p. xvii |
| Log Analysis: Overall Issues | p. 1 |
| Introduction | p. 2 |
| IT Budgets and Results: Leveraging OSS Solutions at Little Cost | p. 2 |
| Reporting Security Information to Management | p. 5 |
| Example of an Incident Report: IDS Case No. 123, 5 September 2005 | p. 6 |
| Combining Resources for an "Eye-in-the-Sky" View | p. 9 |
| Blended Threats and Reporting | p. 12 |
| Conclusion | p. 16 |
| Code Solutions | p. 16 |
| Bird's-Eye View for Management: HTML | p. 16 |
| Birds-Eye View for Security Teams: HTML | p. 20 |
| Commercial Solutions: ArcSight and Netforensics | p. 30 |
| Summary | p. 32 |
| Solutions Fast Track | p. 32 |
| Frequently Asked Questions | p. 35 |
| IDS Reporting | p. 37 |
| Introduction | p. 38 |
| Session Logging with Snort | p. 39 |
| Did That Exploit Work? Did the Attacker Download Any Data? | p. 41 |
| An Example of a Web Connection | p. 43 |
| An Example of a Web Connection with a Backdoor Snort Session | p. 43 |
| Session/Flow Logging with Argus | p. 44 |
| Database Setup | p. 46 |
| Can You Determine When a DDoS/DoS Attack Is Occurring? | p. 53 |
| Using Snort for Bandwidth Monitoring | p. 57 |
| Using Bro to Log and Capture Application-Level Protocols | p. 65 |
| Tracking Malware and Authorized Software in Web Traffic | p. 67 |
| Determining Which Machines Use a Provided/Supported Browser | p. 71 |
| Tracking Users' Web Activities with Bro | p. 74 |
| Using Bro to Gather DNS and Web Traffic Data | p. 79 |
| Using Bro for Blackholing Traffic to Malware-Infested Domains | p. 90 |
| Using Bro to Identify Top E-Mail Senders/Receivers | p. 101 |
| Top Mail Server | p. 102 |
| Top E-Mail Address | p. 103 |
| Virus Attachment Du Jour | p. 104 |
| Summary | p. 107 |
| Solutions Fast Track | p. 107 |
| Frequently Asked Questions | p. 111 |
| Firewall Reporting | p. 113 |
| Firewall Reporting: A Reflection of the Effectiveness of Security Policies | p. 114 |
| The Supporting Infrastructure for Firewall Log Management | p. 116 |
| Parsing the Data | p. 118 |
| Tools for an Overview of Activity | p. 126 |
| Time History Graphics | p. 127 |
| Reporting Statistics | p. 132 |
| Statistics by Country | p. 132 |
| Statistics by Business Partner | p. 135 |
| What Is "Normal" and What Is Threatening | p. 136 |
| Tools and URLs | p. 138 |
| Summary | p. 139 |
| Solutions Fast Track | p. 139 |
| Frequently Asked Questions | p. 141 |
| Systems and Network Device Reporting | p. 143 |
| Introduction | p. 144 |
| What Should the Logs Log? Everything? | p. 145 |
| The 5 Ws (Who, What, When, Where, and Why) | p. 145 |
| Web Server Logs | p. 147 |
| Recon and Attack Information | p. 148 |
| Identifying User Agent Types | p. 149 |
| Isolating Attacking IP Addresses | p. 151 |
| Correlating Data with the Host System | p. 152 |
| Did They Try to Get In? | p. 152 |
| Did They Get In? | p. 153 |
| What Did They Do While They Were In? | p. 155 |
| Pulling It All Together | p. 156 |
| Awstats Graphical Charting of Web Statistics | p. 156 |
| Top Attacker and Top User for the Web Server | p. 160 |
| Summary | p. 162 |
| Solutions Fast Track | p. 162 |
| Frequently Asked Questions | p. 162 |
| Creating a Reporting Infrastructure | p. 165 |
| Introduction | p. 166 |
| Creating IDS Reports from Snort Logs-Example Report Queries | p. 166 |
| Prepare Different Report Formats-Text, Web, E-mail | p. 177 |
| Creating IDS Reports from Bro Logs-Application Log Information | p. 178 |
| Prepare Different Report Formats-Text, Web, E-mail | p. 185 |
| Summary | p. 190 |
| Solutions Fast Track | p. 190 |
| Frequently Asked Questions | p. 191 |
| Scalable Enterprise Solutions (ESM Deployments) | p. 193 |
| Introduction | p. 194 |
| What Is ESM? | p. 196 |
| Security Policy | p. 197 |
| Controlling Configuration | p. 198 |
| Controlling Deployment | p. 200 |
| Monitoring | p. 202 |
| When Deploying ESM Makes Sense | p. 205 |
| Questions Your Organization Should Be Asking | p. 207 |
| What Problem Are You Trying to Solve? | p. 207 |
| How Many Information Sources Are Manageable? | p. 208 |
| What Benefits Do I Gain from ESM? | p. 209 |
| What Is the Return on Investment for ESM Tools? | p. 211 |
| What Type of Reports Do I Expect from ESM? | p. 213 |
| Monitoring and Managing versus Reporting | p. 214 |
| Which Security Reporting Tools to Aggregate into ESM | p. 216 |
| Determining How Much Data Is Too Much | p. 219 |
| Using ESM Reporting for Maximum Performance | p. 220 |
| Real-Time Reporting | p. 221 |
| Centralized Repository Reporting | p. 222 |
| ESM Reporting as a Single Point of View | p. 224 |
| Automation of ESM Reporting | p. 226 |
| Special Considerations for Using ESM | p. 227 |
| Security | p. 227 |
| Reliability | p. 228 |
| Scalability | p. 229 |
| Lessons Learned Implementing ESM | p. 230 |
| Knowing Your Environment | p. 231 |
| Implementing at the Right Pace | p. 232 |
| Obtaining Vendor Support | p. 234 |
| Ensuring Usability | p. 235 |
| Summary | p. 237 |
| Solutions Fast Track | p. 238 |
| Frequently Asked Questions | p. 241 |
| Managing Log Files with Log Parser | p. 243 |
| Introduction | p. 244 |
| Log File Conversion | p. 244 |
| Standardizing Log Formats | p. 244 |
| Using XML for Reporting | p. 248 |
| Correlating Log File Data | p. 251 |
| Identifying Related Data | p. 252 |
| Converting Related Log Files | p. 253 |
| Analyzing Related Log File Data | p. 257 |
| Log Rotation and Archival | p. 259 |
| Rotating Log Files | p. 259 |
| Rotating Log Files Based on Size | p. 260 |
| Rotating Log Files Based on Date | p. 260 |
| Automating Log File Rotation | p. 261 |
| Determining an Archiving Methodology | p. 262 |
| Meeting Legal or Policy Requirements | p. 263 |
| Archiving Logs for Non-Repudiation | p. 264 |
| Building a Hierarchical Logging Directory Structure | p. 266 |
| Using a Syslog Server | p. 269 |
| Separating Logs | p. 271 |
| Determining Log File Separation Strategies | p. 271 |
| Separating by Date | p. 272 |
| Separating by Event Type | p. 272 |
| Separating by System | p. 273 |
| Using Separated Log Files | p. 275 |
| Developing a Separated Log File Hierarchy | p. 276 |
| Summary | p. 277 |
| Solutions Fast Track | p. 277 |
| Frequently Asked Questions | p. 279 |
| Investigating Intrusions with Log Parser | p. 281 |
| Introduction | p. 282 |
| Locating Intrusions | p. 282 |
| Monitoring Logons | p. 283 |
| Excessive Failed Logons | p. 283 |
| Terminal Services Logons | p. 284 |
| Monitoring IIS | p. 287 |
| Identifying Suspicious Files | p. 287 |
| Finding Modification Dates | p. 289 |
| Reconstructing Intrusions | p. 291 |
| Most Recently Used Lists | p. 291 |
| Downloading Stolen Data | p. 293 |
| DNS Name Cache | p. 294 |
| User Activity | p. 295 |
| Login Count | p. 298 |
| Services | p. 298 |
| Installed Programs | p. 300 |
| Summary | p. 302 |
| Solutions Fast Track | p. 302 |
| Frequently Asked Questions | p. 304 |
| Managing Snort Alerts with Microsoft Log Parser | p. 305 |
| Introduction | p. 306 |
| Building Snort IDS Reports | p. 306 |
| Gathering Snort Logs | p. 306 |
| Building an Alerts Detail Report | p. 308 |
| Most Common Alerts | p. 309 |
| Alerts by IP Address | p. 317 |
| Building an Alerts Overview Report | p. 319 |
| Managing Snort Rules | p. 323 |
| Summary | p. 327 |
| Index | p. 329 |
| Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9781597490429
ISBN-10: 1597490423
Published: 1st January 2006
Format: Paperback
Language: English
Number of Pages: 350
Audience: Professional and Scholarly
Publisher: Syngress Media,U.S.
Country of Publication: US
Dimensions (cm): 23.5 x 18.42 x 2.54
Weight (kg): 0.5
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Cloud Native Application Protection Platforms
A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Paperback
RRP $125.75
$60.99
OFF























