References
1.
SimpleEventCorrelator(SEC)manpage,[online].Available:http://kodu.neti.ee/risto/sec/sec.pl.html
2.
"Log watch on SourceForge.net."
SourceForge.net
, [online].Web. 22July2010.Available:http://sourceforge.net/projects/logwatch/files/
3.
SLAPS-2, [online].Available: http://www.openchannelfoundation. org/projects/SLAPS-2
4.
‘‘A New Architecture for Managing Enterprise Log Data,’’
USENIX Systems Administration (LISA XVI) Conference Proceedings,
pp. 121-132,
USENIX Association, November 2002.
5.
[Logsurfer],[online].Available: http://www.cert.dfn.de/eng/logsurf/
6.
Hansen, Stephen E., and Todd Atkins. "Automated System Monitoring and Notification with Swatch." Proceed-ings
of LISA VII
(1993): 145-52. Print.
7.
Risto Varandi, “SEC –
A Lightweight Event Correlation Tool.”
Proceedings of the 2002 IEEE Workshop on IP Operations and
Management
.
8.
[LoGS] Prewet
t, James E., ‘‘Listening
to Your Cluster with LoGS,’’
The Fifth LCI International Conference on Linux Clusters:
TheHPC Revolution 2004,
Linux Cluster Institute, http://www.linuxclustersinstitute.org/Linux-HPC-Revolution/Archive/PDF04/05-
Prewett_J.pdf, May 2004.
9.
Rouillard, John P. "Real-time Log File Analysis Using the Simple Event Correlator (SEC)."
Proceedings of LISA XVIII
(2004): 133-
49. Print.
10.
Justin Myers, Michael Grimaila, Robert Mills, “Towards Insider Threat Detection using Web Server Logs.”CSIIRW,
ACM, APRIL
2009.
11.
SEC- Open Source and Platform Independent Event Correlation Tool. Web. 22 July 2010.
.
12.
Splunk
|
IT Search
for Log Management,
Operations, Security and Compliance. Web. 22 July 2010.
.
13.
Guofei Gu , Pralhad Fogla , David Dagon , Wenke Lee , Boris Skoric , “Towards an information –
theoretic framework for analysing
intrusion detection systems, Proceedings of 11
th
European conference on Research in Computer Security , p.527-546, September 18-
20 , 2006 , Hamburg , Germany.
14.
Matt Bing and Carl Erickson, “Extending UNIX System Logging with SHARP”,
Proceedings of USENIX 14th System Administration
Conference
, pp. 101-108, December 2000.
15.
S. Axelsson. “The base
-rate fallacy and its implications
for the difficulty of intrusion detection”,In
Proceedings of ACM CCS’1999
,
November 1999.
16.
Hasan, Masum, Binay Sugla, and Ramesh Viswanathan. “A Conceptual Framework for Network Management Event Correlation and
Filtering Systems”. Integrated Network Manag
ement, 233
–
246, 1999.
17.
Hewlett-Packard Company,
Event Correlation Services
–
Designer’s Guide
, HP document J1095-90304, 1998.
18.
SMARTS,[online].Available:
http://www.smarts.com
.
19.
NerveCenter, [0nline].Available :
http://www.open.com/htm/nervecenter.htm
20.
"Syslog Server | Syslogng."
GatewaySolution|NetworkSecurity|BalaBitITSecurity
.Web.22July2010.security/syslog-ng/>.