Network Forensics
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated,
2017.
|
Colección: | New York Academy of Sciences Ser.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Title Page
- Table of Contents
- Introduction
- What This Book Covers
- How This Book Is Organized
- 1 Introduction to Network Forensics
- What Is Forensics?
- Incident Response
- The Need for Network Forensic Practitioners
- Summary
- References
- 2 Networking Basics
- Protocols
- Request for Comments
- Internet Registries
- Internet Protocol and Addressing
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- Ports
- Domain Name System
- Support Protocols (DHCP)
- Support Protocols (ARP)
- Summary
- References
- 3 Host-Side Artifacts
- Services
- Connections
- Tools
- Summary
- 4 Packet Capture and Analysis
- Capturing Packets
- Packet Analysis with Wireshark
- Network Miner
- Summary
- 5 Attack Types
- Denial of Service Attacks
- Vulnerability Exploits
- Insider Threats
- Evasion
- Application Attacks
- Summary
- 6 Location Awareness
- Time Zones
- Using whois
- Traceroute
- Geolocation
- Location-Based Services
- WiFi Positioning
- Summary
- 7 Preparing for Attacks
- NetFlow
- Logging
- Antivirus
- Incident Response Preparation
- Security Information and Event Management
- Summary
- 8 Intrusion Detection Systems
- Detection Styles
- Host-Based versus Network-Based
- Architecture
- Alerting
- Summary
- 9 Using Firewall and Application Logs
- Syslog
- Event Viewer
- Firewall Logs
- Common Log Format
- Summary
- 10 Correlating Attacks
- Time Synchronization
- Packet Capture Times
- Log Aggregation and Management
- Timelines
- Security Information and Event Management
- Summary
- 11 Network Scanning
- Port Scanning
- Vulnerability Scanning
- Port Knocking
- Tunneling
- Passive Data Gathering
- Summary
- 12 Final Considerations
- Encryption
- Cloud Computing
- The Onion Router (TOR)
- Summary
- End User License Agreement