Applied network security monitoring collection, detection and analysis
This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress is an imprint of Elsevier
© 2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- 1. The practice of applied network security monitoring
- 2. Planning data collection
- 3. The sensor platform
- 4. Session data
- 5. Full packet capture data
- 6. Packet string data
- 7. Detection mechanisms, indicators of compromise, and signatures
- 8. Reputation-based detection
- 9. Signature-based detection with Snort and Suricata
- 10. The Bro platform
- 11. Anomaly-based detection with statistical data
- 12. Using canary honeypots for detection
- 13. Packet analysis
- 14. Friendly and threat intelligence
- 15. The analysis process


