Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it.
Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting.
Explore network, host, and service sensors for capturing security data
Store data traffic with relational databases, graph databases, Redis, and Hadoop
Use SiLK, the R language, and other tools for analysis and visualization
Detect unusual phenomena through Exploratory Data Analysis (EDA)
Identify significant structures in networks with graph analysis
Determine the traffic that’s crossing service ports in a network
Examine traffic volume and behavior to spot DDoS and database raids
Get a step-by-step process for network mapping and inventory
Representations for Genetic and Evolutionary Algorithms
One of the major challenges for researchers in the field of management science,
information systems, business informatics, and computer science is to develop
methods and tools that help organizations, such as companies or public institutions,
to fulfill their tasks efficiently. However, during the last decade,
Wireless Sensors and Instruments: Networks, Design, and Applications
Wireless Sensors and Instruments explains the underlying principles of wireless instruments, which incorporate recent communications technology in instruments and instrumentation systems. This book extensively covers software support at the stand-alone instrument and network levels and includes numerous examples from industrial applications,...
Dictionary of Computing This dictionary provides the user with a comprehensive range of the vocabulary used in the field of computing. It covers all aspects of computing, including hardware, software, peripherals, networks and programming, as well as many applications in which computers are used, such as the Internet or desktop publishing. It also describes the latest...
A Practical Introduction to Computer Architecture (Texts in Computer Science) This book blends traditional teaching approaches with the use of mathematics, together with the use of a hardware description language and a concrete processor as vehicles for "hands-on" modelling and experimenting with digital logic and processor design. This unique approach encourages readers to derive their own conclusions via... Internet Success: A Study of Open-Source Software Commons
The use of open-source software (OSS)--readable software source code that can be copied, modified, and distributed freely--has expanded dramatically in recent years. The number of OSS projects hosted on SourceForge.net (the largest hosting Web site for OSS), for example, grew from just over 100,000 in 2006 to more than 250,000 at the...