The Graylog Blog
Centralized Log Management for Network Monitoring
Centralized log management aggregates all event and security logs so you can effectively monitor network security.
Security Log Monitoring and DNS Request Analysis
By using strategically placed sensors, Graylog’s content pack collects DNS logs guarantees interoperability with any DNS request, even if it is going to an unexpected DNS server or if it was blocked somewhere further down the path.
Tapping Wires for Lean Security Monitoring: DNS Request Analysis with Open Source Software
The combined force of virus scanners, firewalls, IDS systems, and a log management system is a great way to protect your network. We would like to introduce an additional method of security monitoring.
A practical approach to Open Source network security monitoring
We will take a look at how you can analyze network traffic data in order to detect network intrusions. Every phase of intrusion will leave traces and with the correct tools in place, you can detect these early on and take countermeasures.