Book description
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques.
Publisher resources
Table of contents
- Preface
-
I. Data
- 1. Sensors and Detectors: An Introduction
- 2. Network Sensors
- 3. Host and Service Sensors: Logging Traffic at the Source
- 4. Data Storage for Analysis: Relational Databases, Big Data, and Other Options
-
II. Tools
-
5. The SiLK Suite
- What Is SiLK and How Does It Work?
- Acquiring and Installing SiLK
- Choosing and Formatting Output Field Manipulation: rwcut
- Basic Field Manipulation: rwfilter
- rwfileinfo and Provenance
- Combining Information Flows: rwcount
- rwset and IP Sets
- rwuniq
- rwbag
- Advanced SiLK Facilities
- Collecting SiLK Data
- Further Reading
- 6. An Introduction to R for Security Analysts
- 7. Classification and Event Tools: IDS, AV, and SEM
- 8. Reference and Lookup: Tools for Figuring Out Who Someone Is
- 9. More Tools
-
5. The SiLK Suite
-
III. Analytics
-
10. Exploratory Data Analysis and Visualization
- The Goal of EDA: Applying Analysis
- EDA Workflow
- Variables and Visualization
- Univariate Visualization: Histograms, QQ Plots, Boxplots, and Rank Plots
- Bivariate Description
-
Multivariate Visualization
-
Operationalizing Security Visualization
- Rule one: bound and partition your visualization to manage disruptions
- Rule two: label anomalies
- Rule three: use trendlines, distinguish artifacts from observations
- Rule four: be consistent across plots
- Rule five: annotate with contextual information
- Rule six: avoid flash in favor of expressiveness
- Rule seven: when performing long jobs, give the user some status feedback
-
Operationalizing Security Visualization
- Further Reading
- 11. On Fumbling
- 12. Volume and Time Analysis
- 13. Graph Analysis
- 14. Application Identification
-
15. Network Mapping
- Creating an Initial Network Inventory and Map
- Updating the Inventory: Toward Continuous Audit
- Further Reading
-
10. Exploratory Data Analysis and Visualization
- Index
- Colophon
- Copyright
Product information
- Title: Network Security Through Data Analysis
- Author(s):
- Release date: February 2014
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781449357900
You might also like
book
Network Security Through Data Analysis, 2nd Edition
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In …
book
Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for …
video
Cisco NetFlow for Cyber Security Big Data Analytics
More than 6 hours of video training covering everything you need to know to deploy, configure, …
book
The Network Security Test Lab: A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is …