This document discusses log correlation and network forensics. It covers ensuring log integrity, managing timestamps, normalization and filtering of logs. Log integrity can be compromised during transmission between acquisition and collection points. Normalization is needed to correlate different log formats. Correlation and filtering tools use either a top-down or bottom-up approach to interpret logs. Ensuring log reliability and integrity is important for network forensics investigations and attributions.