This book proposes to show the added value of OLAP
techniques for IDS event analysis. It will discuss
the currently available tools that are used together
with the IDS Snort to build a strong security system.
This will help the reader to understand what an IDS
is and what tools can help in analyzing IDS events.
The book will also cover the topic of OLAP and the
features that are important when developing an OLAP
based analysis system. Finally, the book will show
the reader how to build a cube with open source
tools. The steps taken to install Snort are discussed
including the interconnection with programs such as
MySQL for the collection of alerts . It explains some
of the most interesting possibilities for analyzing
data and evaluates the most popular open source
reporting tools for Snort.
To conclude it will show the result of building a
cube with Mondrian and the possibilities for
analyzing the data with a web-based front end using
JPivot.
techniques for IDS event analysis. It will discuss
the currently available tools that are used together
with the IDS Snort to build a strong security system.
This will help the reader to understand what an IDS
is and what tools can help in analyzing IDS events.
The book will also cover the topic of OLAP and the
features that are important when developing an OLAP
based analysis system. Finally, the book will show
the reader how to build a cube with open source
tools. The steps taken to install Snort are discussed
including the interconnection with programs such as
MySQL for the collection of alerts . It explains some
of the most interesting possibilities for analyzing
data and evaluates the most popular open source
reporting tools for Snort.
To conclude it will show the result of building a
cube with Mondrian and the possibilities for
analyzing the data with a web-based front end using
JPivot.