Video demonstration of log aggregation and correlation analysis technology
How various network application logs are preprocessed into events, and how all kinds of events have been aggregated for correlation analysis have been in the "open Source safe operation Dimensional plane Ossim best practices" book Detailed analysis, the following shows you in the Big Data IDs room environment in the massive log, quickly locate the source of SSH brute Force attack, let you see the network attack.
HD Video Address:
Http://www.tudou.com/programs/view/uP0V9fQlzuo
How do you feel after you've seen it? Can the ELK and Splunk systems be implemented? Here I just give an example of SSH, but similar to this visual analysis method in the Ossim there are thousands of types, interested friends can learn more.
This article is from the "Lee Chenguang Original Technology blog" blog, please be sure to keep this source http://chenguang.blog.51cto.com/350944/1728514
Video demonstration of log aggregation and correlation analysis technology