Log analysis fundamentals and why logging is essential for security visibility
SIM (Security Information and Event Management) correlation and event analysis
Network attack signature detection using tools such as Snort and packet capture analysis
1. Introduction to Logging and Security Visibility Effective security monitoring depends on logging the right information and establishing baselines for normal behavior. A common challenge is that security tools—especially IDS sensors—produce many false positives, which can lead analysts to ignore real threats (as seen in major breaches such as Home Depot). 2. Logging Strategy and Log Integrity Logging Strategy Essentials Organizations must implement:
A clear logging strategy
Structured and normalized log data
Centralized logging
Real-time and continuous monitoring
Long-term storage for historical correlation
What Must Be Logged
Unsuccessful authentication attempts
Example: 100 → 10,000 attempts indicates brute-force or dictionary attacks
Maintaining Log Integrity Logs must be treated like financial ledgers:
Log storage must be read-only
Use hashing to ensure logs are not modified
Use encryption to protect confidentiality
Large storage capacity is required to retain logs for long-term, low-and-slow attack correlation
Syslog is the most common centralized log transport and storage method
3. SIM (Security Information and Event Management) Correlation What SIMs Do SIM systems do not store logs; they:
Collect and centralize logs from many devices (nodes, routers, switches, appliances)
Correlate and analyze events
Provide near real-time security violation alerts
Reveal attack patterns that individual log sources might not show
Log Sources for SIM Analysis SIMs typically gather logs from:
Files (data logs)
Operating Systems
Network traffic
Applications
Audit Reduction Tools Because audit logs can be massive, tools are used to:
Eliminate unnecessary data
Focus analysts on events of significance
4. Network Attack Signature Detection Signature detection identifies patterns that indicate malicious activity. Tools such as Snort and packet capture analysis are commonly used. Types of Signatures A. Standard Communication Signatures
ICMP ping has a predictable payload (A B C D …)
TCP three-way handshake (SYN, SYN-ACK, ACK) helps identify typical connections such as FTP (21) or Telnet (23)
B. Reconnaissance Scans
Ping Sweeps
Echo requests sent to incrementing IP addresses
Port Scans
One source IP sending SYN packets to many ports on one host
Modern scanners use non-sequential methods
Stealth Scans (used to evade detection)
ACK scans
SYN stealth scans
FIN scans (only FIN flag)
NULL scans (no flags)
Christmas (Xmas) Scans
Flags typically set: FIN, URG, PUSH
Snort distinguishes traditional Xmas scans from tools like Nmap (which uses only FUP flags)
C. Denial of Service (DoS) Attacks
Ping of Death – oversized ICMP packets
SYN Flood – large numbers of half-open TCP connections exhausting port capacity
D. Trojans and Backdoors
Identified by traffic on known Trojan ports
Example:
Netbus → port 12345
Back Orifice → port 31337
5. The Objective of Correlation and Detection The primary goal is to:
Detect attack patterns before they complete
Combine behavior-based insight with signature-based detection
Continuously update rules and detection logic as threats evolve
Tools like Snort rely on constantly updated rule sets to stay effective against modern attacks.
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy
Log analysis fundamentals and why logging is essential for security visibility
SIM (Security Information and Event Management) correlation and event analysis
Network attack signature detection using tools such as Snort and packet capture analysis
1. Introduction to Logging and Security Visibility Effective security monitoring depends on logging the right information and establishing baselines for normal behavior. A common challenge is that security tools—especially IDS sensors—produce many false positives, which can lead analysts to ignore real threats (as seen in major breaches such as Home Depot). 2. Logging Strategy and Log Integrity Logging Strategy Essentials Organizations must implement:
A clear logging strategy
Structured and normalized log data
Centralized logging
Real-time and continuous monitoring
Long-term storage for historical correlation
What Must Be Logged
Unsuccessful authentication attempts
Example: 100 → 10,000 attempts indicates brute-force or dictionary attacks
Maintaining Log Integrity Logs must be treated like financial ledgers:
Log storage must be read-only
Use hashing to ensure logs are not modified
Use encryption to protect confidentiality
Large storage capacity is required to retain logs for long-term, low-and-slow attack correlation
Syslog is the most common centralized log transport and storage method
3. SIM (Security Information and Event Management) Correlation What SIMs Do SIM systems do not store logs; they:
Collect and centralize logs from many devices (nodes, routers, switches, appliances)
Correlate and analyze events
Provide near real-time security violation alerts
Reveal attack patterns that individual log sources might not show
Log Sources for SIM Analysis SIMs typically gather logs from:
Files (data logs)
Operating Systems
Network traffic
Applications
Audit Reduction Tools Because audit logs can be massive, tools are used to:
Eliminate unnecessary data
Focus analysts on events of significance
4. Network Attack Signature Detection Signature detection identifies patterns that indicate malicious activity. Tools such as Snort and packet capture analysis are commonly used. Types of Signatures A. Standard Communication Signatures
ICMP ping has a predictable payload (A B C D …)
TCP three-way handshake (SYN, SYN-ACK, ACK) helps identify typical connections such as FTP (21) or Telnet (23)
B. Reconnaissance Scans
Ping Sweeps
Echo requests sent to incrementing IP addresses
Port Scans
One source IP sending SYN packets to many ports on one host
Modern scanners use non-sequential methods
Stealth Scans (used to evade detection)
ACK scans
SYN stealth scans
FIN scans (only FIN flag)
NULL scans (no flags)
Christmas (Xmas) Scans
Flags typically set: FIN, URG, PUSH
Snort distinguishes traditional Xmas scans from tools like Nmap (which uses only FUP flags)
C. Denial of Service (DoS) Attacks
Ping of Death – oversized ICMP packets
SYN Flood – large numbers of half-open TCP connections exhausting port capacity
D. Trojans and Backdoors
Identified by traffic on known Trojan ports
Example:
Netbus → port 12345
Back Orifice → port 31337
5. The Objective of Correlation and Detection The primary goal is to:
Detect attack patterns before they complete
Combine behavior-based insight with signature-based detection
Continuously update rules and detection logic as threats evolve
Tools like Snort rely on constantly updated rule sets to stay effective against modern attacks.
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy