Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traff
Network Security Through Data Analysis: From Data to Action
β Scribed by Michael Collins
- Publisher
- OβReilly Media
- Year
- 2017
- Tongue
- English
- Leaves
- 428
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. Youβll understand how your network is used, and what actions are necessary to harden and defend the systems within it.
In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics.
Youβll learn how to:
- Use sensors to collect network, service, host, and active domain data
- Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect
- Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques
- Analyze text data, traffic behavior, and communications mistakes
- Identify significant structures in your network with graph analysis
- Examine insider threat data and acquire threat intelligence
- Map your network and identify significant hosts within it
- Work with operations to develop defenses and analysis techniques
β¦ Subjects
Data Processing;Databases & Big Data;Computers & Technology;Network Security;Networking & Cloud Computing;Computers & Technology;Security & Encryption;Cryptography;Encryption;Hacking;Network Security;Privacy & Online Safety;Security Certifications;Viruses;Computers & Technology;Networking;Computer Science;New, Used & Rental Textbooks;Specialty Boutique
π SIMILAR VOLUMES
Copyright; Table of Contents; Preface; Audience; Contents of This Book; Changes Between Editions; Conventions Used in This Book; Using Code Examples; O'Reilly Safari; How to Contact Us; Acknowledgments; Part I. Data; Chapter 1. Organizing Data: Vantage, Domain, Action, and Validity; Domain; Vantage;
Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. Youβll understand how your network
Traditional intrusion detection and logfile analysis are no longer enough to protect todayβs complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. Youβll understand how your network
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network