Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Generation of rational expressions starting from journalized events
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Generation of rational expressions starting from journalized events  
> Access to the content HTML Beginning of the presentation
PDF PDF version [67 KB]  
> Description The analyse of log is one of the better means to supervise the correct operation of a system or to carry out intrusion detection. For that, the rational expressions are a very powerful tool in order to describe the events. The generation of these expressions can be a long work, especially in an initial way when administrator receive an hundreds event per day. Slct is a tool allowing to guide administrator by presenting solutions to him describing the greatest possible event number.  
> Context & Dates Talk made during RÉSIST, on 30 August 2004.
> Author Denis Ducamp  
> Type [ French - HTML ]  
> Abstract &
Table of content
Plan (1/6) : la journalisation
La journalisation
La journalisation : l'analyse de journaux
Plan (2/6) : la détection d'intrusion
La détection d'intrusion
La détection d'intrusion
Plan (3/6) : les expressions rationnelles
Les expressions rationnelles
Plan (4/6) : slct
slct : fonctionnement
slct : exemples (1/3)
slct : exemples (2/3)
slct : exemples (3/3)
Plan (5/6) : des utilisations de ces expressions
Des utilisations de ces expressions : scripts maison
Des utilisations... pour l'affichage temps réel
Des utilisations... en mode statique : swatch
Des utilisations... en mode statique : logcheck
Des utilisations... en mode dynamique : logsurfer
Des utilisations... en mode dynamique : sec
Plan (6/6) : d'autres possibilités
D'autres possibilités
> Related documents
[Presentation]  Logging and incident processing [15 May 2008 - French]
[Presentation]  Workstation Security [29 March 2007 - French]
[Presentation]  Logs and incident processing [29 March 2007 - French]
[Presentation]  Generation of regular expressions from logged events [2 February 2005 - French]
[Presentation]  Useful standards for network security [20 October 2003 - French]
[Presentation]  Logging (how to be ready to incidents) [6 February 2003 - French]
[Presentation]  Internet Firewall Management [23 June 2002 - French]
[Tip]  Installing Syslog-NG [29 October 2001 - French]
[Presentation]  XML-Logs: Analyse your logs using XML encoding [10 October 2000 - French]
[Tool]  xml-logs tool [Log management using XML - English]
[Standard]  Universal Format for Logger Messages [May 1999 - English]
> Copyright © 2004, Hervé Schauer Consultants, all rights reserved.


Last modified on 17 September 2004 at 11:08:28 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants