Applied network security monitoring collection, detection and analysis

This book is a guide to becoming an Network Security Monitoring (NSM) analyst. It follows the three stages of the NSM cycle: collection, detection, and analysis, and features real-world examples

Saved in:
Bibliographic Details
Main Author: Sanders, Chris (Author)
Format: Book
Language:English
Published: Waltham, MA Syngress is an imprint of Elsevier © 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • 1. The practice of applied network security monitoring
  • 2. Planning data collection
  • 3. The sensor platform
  • 4. Session data
  • 5. Full packet capture data
  • 6. Packet string data
  • 7. Detection mechanisms, indicators of compromise, and signatures
  • 8. Reputation-based detection
  • 9. Signature-based detection with Snort and Suricata
  • 10. The Bro platform
  • 11. Anomaly-based detection with statistical data
  • 12. Using canary honeypots for detection
  • 13. Packet analysis
  • 14. Friendly and threat intelligence
  • 15. The analysis process