Network security through data analysis : from data to action /
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media,
2017.
|
Edición: | Second edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- I. Data. Organizing data: vantage, domain, action, and validity
- Vantage: understanding sensor placement in networks
- Sensors in the network domain
- Data in the service domain
- Sensors in the service domain
- Data and sensors in the host domain
- Data and sensors in the active domain
- II. Tools. Getting data in one place
- The SiLK suite
- Reference and Lookup: tools for figuring out who someone is
- III. Analytics. Exploratory data analysis and visualization
- On analyzing text
- On Fumbling
- On volume and time
- On graphs
- On insider threat
- On threat intelligence
- Application identification
- On network mapping
- On working with Ops
- Conclusions.