Amazon cover image
Image from Amazon.com

Network security through data analysis : building situational awareness / Michael Collins

By: Material type: TextTextPublication details: Sebastopol, California : O'Reilly Media, Incorporated, c2014Description: xvii, 325 pages : illustrations ; 23 cmISBN:
  • 9781449357900
Subject(s): LOC classification:
  • TK 5105.59 .C65 2014
Contents:
Part 1. Data -- 1. Sensors and detectors: an introduction -- 2. Network sensors -- 3. Host and service sensors: logging traffic at the source -- 4. Data storage for analysis: relational databases, big data and other options -- Part 2. Tools -- 5. The SiLK suite -- 6. An introduction to R for security analysts -- 7. Classification and event tools: IDS, AV, and SEM -- 8. Reference and lookup: tools for figuring out who someone is -- 9. More tools -- Part 3. Analytics -- 10. Exploratory data analysis and visualization -- 11. On fumbling -- 12. Volume and time analysis -- 13. Graph analysis -- 14. Application identification -- 15. Network mapping.
Summary: In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Main General Circulation Mobile and Web Applications GC TK 5105.59 .C65 2014 c.1 (Browse shelf(Opens below)) c.1 Available NULIB000009211

Includes bibliographical references and index.

Part 1. Data -- 1. Sensors and detectors: an introduction -- 2. Network sensors -- 3. Host and service sensors: logging traffic at the source -- 4. Data storage for analysis: relational databases, big data and other options -- Part 2. Tools -- 5. The SiLK suite -- 6. An introduction to R for security analysts -- 7. Classification and event tools: IDS, AV, and SEM -- 8. Reference and lookup: tools for figuring out who someone is -- 9. More tools -- Part 3. Analytics -- 10. Exploratory data analysis and visualization -- 11. On fumbling -- 12. Volume and time analysis -- 13. Graph analysis -- 14. Application identification -- 15. Network mapping.

In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques.

There are no comments on this title.

to post a comment.