ISBN 9789351105244,Network Security Through Data Analysis: Building Situational Awareness

Network Security Through Data Analysis: Building Situational Awareness


Shroff Publishers

Rs618 Rs650 5% OFF


Shroff Publishers

Publication Year 2014

ISBN 9789351105244

ISBN-10 9351105245


Number of Pages 508 Pages
Language (English)

Network security

Network Security Through Data Analysis Traditional intrusion detection and logfile analysis are no longer enough to protect todays complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. Youll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. Its ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic thats crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory Contents: Preface Part I. Data 1. Sensors and Detectors: An Introduction 2. Network Sensors 3. Host and Service Sensors: Logging Traffic at the Source 4. Data Storage for Analysis: Relational Databases, Big Data, and Other Options Part II. Tools 5. The SiLK Suite 6. An Introduction to R for Security Analysts 7. Classification and Event Tools: IDS, AV, and SEM 8. Reference and Lookup: Tools for Figuring Out Who Someone Is 9. More Tools Part III. Analytics 10. Exploratory Data Analysis and Visualization 11. On Fumbling 12. Volume and Time Analysis 13. Graph Analysis 14. Application Identification 15. Network Mapping Index About the Author: Michael Collins Michael Collins is the chief scientist for RedJack, LLC., a NetworkSecurity and Data Analy