Book description
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.
Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.
The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.
If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
- Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst
- Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus
- Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples
- Companion website includes up-to-date blogs from the authors about the latest developments in NSM
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgements
- About the Authors
- Foreword
- Preface
- Chapter 1. The Practice of Applied Network Security Monitoring
- Section 1: Collection
-
Section 2: Detection
- Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures
- Chapter 8. Reputation-Based Detection
- Chapter 9. Signature-Based Detection with Snort and Suricata
- Chapter 10. The Bro Platform
- Chapter 11. Anomaly-Based Detection with Statistical Data
- Chapter 12. Using Canary Honeypots for Detection
- Section 3: Analysis
- Appendix 1. Security Onion Control Scripts
- Appendix 2. Important Security Onion Files and Directories
- Appendix 3. Packet Headers
- Appendix 4. Decimal / Hex / ASCII Conversion Chart
- Index
Product information
- Title: Applied Network Security Monitoring
- Author(s):
- Release date: November 2013
- Publisher(s): Syngress
- ISBN: 9780124172166
You might also like
book
Network Security, Firewalls, and VPNs, 3rd Edition
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business …
book
The Practice of Network Security Monitoring
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional …
book
Introduction to Computer Networks and Cybersecurity
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …